From 51b0e8f6343f778c4beb6d2d0e9b4e40be25bfcc Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Tue, 7 Dec 2021 18:08:15 +0200 Subject: [PATCH 01/10] remove old test files Signed-off-by: Kimonas Sotirchos --- tests/Makefile | 72 - tests/README.md | 30 - tests/doc.go | 2 - tests/go.mod | 76 - tests/go.sum | 614 -- .../katib-external-db/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 80 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - .../~g_v1_configmap_trial-template.yaml | 77 - .../~g_v1_secret_katib-controller.yaml | 8 - ...secret_katib-mysql-secrets-kmcg6hfkfg.yaml | 15 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - .../katib-standalone-ibm/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 67 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - .../~g_v1_configmap_trial-template.yaml | 77 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - .../katib-standalone/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - .../~g_v1_configmap_trial-template.yaml | 77 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - .../api-service/kustomization.yaml | 18 - .../application-crds/kustomization.yaml | 10 - .../application/kustomization.yaml | 22 - .../application/params_0.env | 1 - .../argo/kustomization.yaml | 24 - tests/legacy_kustomizations/argo/params_0.env | 12 - .../bootstrap/kustomization.yaml | 22 - .../bootstrap/params_0.env | 2 - .../centraldashboard/kustomization.yaml | 24 - .../centraldashboard/params_0.env | 3 - .../cert-manager-crds/kustomization.yaml | 10 - .../kustomization.yaml | 14 - .../params_0.env | 1 - .../cert-manager/kustomization.yaml | 25 - .../cert-manager/params_0.env | 1 - .../cloud-endpoints/kustomization.yaml | 22 - .../cloud-endpoints/params_0.env | 2 - .../default-install/kustomization.yaml | 14 - .../default-install/params_0.env | 2 - .../gpu-driver/kustomization.yaml | 18 - .../iap-ingress/kustomization.yaml | 24 - .../iap-ingress/params_0.env | 10 - .../istio-crds/kustomization.yaml | 10 - .../istio-install/kustomization.yaml | 10 - .../istio/kustomization.yaml | 14 - .../legacy_kustomizations/istio/params_0.env | 2 - .../jupyter-web-app/kustomization.yaml | 23 - .../jupyter-web-app/params_0.env | 7 - .../katib-controller/kustomization.yaml | 24 - .../katib-controller/params_0.env | 1 - .../katib-crds/kustomization.yaml | 18 - .../kfserving-crds/kustomization.yaml | 18 - .../kfserving-install/kustomization.yaml | 22 - .../kfserving-install/params_0.env | 1 - .../knative-crds/kustomization.yaml | 14 - .../knative-eventing-crds/kustomization.yaml | 14 - .../kustomization.yaml | 14 - .../knative-install/kustomization.yaml | 14 - .../kubeflow-roles/kustomization.yaml | 10 - .../metacontroller/kustomization.yaml | 10 - .../metadata/kustomization.yaml | 47 - .../metadata/params_0.env | 1 - .../metadata/params_1.env | 2 - .../notebook-controller/kustomization.yaml | 25 - .../notebook-controller/params_0.env | 3 - .../persistent-agent/kustomization.yaml | 18 - .../kustomization.yaml | 18 - .../pipelines-runner/kustomization.yaml | 18 - .../pipelines-ui/kustomization.yaml | 25 - .../pipelines-ui/params_0.env | 1 - .../pipelines-viewer/kustomization.yaml | 18 - .../profiles/kustomization.yaml | 24 - .../profiles/params_0.env | 4 - .../pytorch-job-crds/kustomization.yaml | 18 - .../pytorch-operator/kustomization.yaml | 18 - .../scheduledworkflow/kustomization.yaml | 18 - .../seldon-core-operator/kustomization.yaml | 18 - .../spark-operator/kustomization.yaml | 18 - .../spartakus/kustomization.yaml | 22 - .../spartakus/params_0.env | 1 - .../tf-job-crds/kustomization.yaml | 18 - .../tf-job-operator/kustomization.yaml | 18 - .../webhook/kustomization.yaml | 22 - .../webhook/params_0.env | 1 - tests/scripts/extract_images.py | 151 - tests/scripts/requirements.txt | 2 - tests/scripts/run-tests.sh | 44 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 9 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 35 - ...ookconfiguration_cert-manager-webhook.yaml | 34 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 19 - ...s.io_v1beta1_application_cert-manager.yaml | 41 - ...v1_deployment_cert-manager-cainjector.yaml | 41 - ...ps_v1_deployment_cert-manager-webhook.yaml | 50 - .../apps_v1_deployment_cert-manager.yaml | 54 - ...erissuer_kubeflow-self-signing-issuer.yaml | 11 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 24 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 23 - ...ert-manager-webhook:webhook-requester.yaml | 19 - ...1_clusterrole_cert-manager-cainjector.yaml | 63 - ..._cert-manager-controller-certificates.yaml | 64 - ...le_cert-manager-controller-challenges.yaml | 86 - ...ert-manager-controller-clusterissuers.yaml | 43 - ..._cert-manager-controller-ingress-shim.yaml | 51 - ...rrole_cert-manager-controller-issuers.yaml | 43 - ...errole_cert-manager-controller-orders.yaml | 63 - ...errolebinding_cert-manager-cainjector.yaml | 17 - ..._cert-manager-controller-certificates.yaml | 17 - ...ng_cert-manager-controller-challenges.yaml | 17 - ...ert-manager-controller-clusterissuers.yaml | 17 - ..._cert-manager-controller-ingress-shim.yaml | 17 - ...nding_cert-manager-controller-issuers.yaml | 17 - ...inding_cert-manager-controller-orders.yaml | 17 - ...g_cert-manager-webhook:auth-delegator.yaml | 18 - ..._v1_configmap_cert-manager-parameters.yaml | 11 - .../~g_v1_namespace_cert-manager.yaml | 8 - .../~g_v1_service_cert-manager-webhook.yaml | 21 - .../expected/~g_v1_service_cert-manager.yaml | 21 - ...erviceaccount_cert-manager-cainjector.yaml | 10 - ...1_serviceaccount_cert-manager-webhook.yaml | 10 - .../~g_v1_serviceaccount_cert-manager.yaml | 10 - .../kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 185 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...r-local-gateway-parameters-tbbdb2842d.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../cluster-local-gateway/kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 164 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...le_cluster-local-gateway-istio-system.yaml | 19 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ...ng_cluster-local-gateway-istio-system.yaml | 15 - ...r-local-gateway-parameters-tbbdb2842d.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../common/centraldashboard/kustomize_test.go | 15 - ..._v1beta1_application_centraldashboard.yaml | 53 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...nfigmap_centraldashboard-links-config.yaml | 113 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - .../application/dex-auth/kustomize_test.go | 15 - ...cedefinition_authcodes.dex.coreos.com.yaml | 13 - .../expected/apps_v1_deployment_dex.yaml | 38 - ....istio.io_v1alpha3_virtualservice_dex.yaml | 19 - ...zation.k8s.io_v1beta1_clusterrole_dex.yaml | 17 - ...k8s.io_v1beta1_clusterrolebinding_dex.yaml | 12 - .../expected/~g_v1_configmap_dex-config.yaml | 8 - .../~g_v1_configmap_dex-parameters.yaml | 18 - .../expected/~g_v1_configmap_dex.yaml | 30 - .../expected/~g_v1_namespace_auth.yaml | 4 - .../test_data/expected/~g_v1_service_dex.yaml | 15 - .../expected/~g_v1_serviceaccount_dex.yaml | 5 - .../istio-1-3-1-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 27 - ...cedefinition_adapters.config.istio.io.yaml | 23 - ...on_attributemanifests.config.istio.io.yaml | 23 - ...n_authorizationpolicies.rbac.istio.io.yaml | 22 - ...ition_certificates.certmanager.k8s.io.yaml | 42 - ...inition_challenges.certmanager.k8s.io.yaml | 34 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 17 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 36 - ...tion_envoyfilters.networking.istio.io.yaml | 21 - ...finition_gateways.networking.istio.io.yaml | 23 - ...cedefinition_handlers.config.istio.io.yaml | 23 - ...n_httpapispecbindings.config.istio.io.yaml | 21 - ...finition_httpapispecs.config.istio.io.yaml | 21 - ...edefinition_instances.config.istio.io.yaml | 23 - ...definition_issuers.certmanager.k8s.io.yaml | 17 - ..._meshpolicies.authentication.istio.io.yaml | 22 - ...edefinition_orders.certmanager.k8s.io.yaml | 36 - ...tion_policies.authentication.istio.io.yaml | 21 - ...ion_quotaspecbindings.config.istio.io.yaml | 21 - ...definition_quotaspecs.config.istio.io.yaml | 21 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 23 - ...ourcedefinition_rules.config.istio.io.yaml | 23 - ...on_serviceentries.networking.istio.io.yaml | 45 - ...ion_servicerolebindings.rbac.istio.io.yaml | 35 - ...definition_serviceroles.rbac.istio.io.yaml | 23 - ...finition_sidecars.networking.istio.io.yaml | 21 - ...edefinition_templates.config.istio.io.yaml | 23 - ...n_virtualservices.networking.istio.io.yaml | 40 - .../apps_v1_daemonset_istio-nodeagent.yaml | 87 - .../apps_v1_deployment_istio-citadel.yaml | 78 - .../apps_v1_deployment_istio-galley.yaml | 122 - ...ps_v1_deployment_istio-ingressgateway.yaml | 202 - .../apps_v1_deployment_istio-pilot.yaml | 185 - .../apps_v1_deployment_istio-policy.yaml | 175 - ..._v1_deployment_istio-sidecar-injector.yaml | 117 - .../apps_v1_deployment_istio-telemetry.yaml | 185 - .../apps_v1_deployment_prometheus.yaml | 87 - ...talpodautoscaler_istio-ingressgateway.yaml | 20 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 19 - ..._horizontalpodautoscaler_istio-policy.yaml | 19 - ...rizontalpodautoscaler_istio-telemetry.yaml | 19 - ...post-install-release-1.3-latest-daily.yaml | 64 - ...v1alpha2_attributemanifest_istioproxy.yaml | 137 - ...v1alpha2_attributemanifest_kubernetes.yaml | 61 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 9 - ....istio.io_v1alpha2_handler_prometheus.yaml | 213 - ...istio.io_v1alpha2_instance_attributes.yaml | 36 - ...tio.io_v1alpha2_instance_requestcount.yaml | 36 - ....io_v1alpha2_instance_requestduration.yaml | 36 - ...stio.io_v1alpha2_instance_requestsize.yaml | 36 - ...tio.io_v1alpha2_instance_responsesize.yaml | 36 - ....io_v1alpha2_instance_tcpbytereceived.yaml | 32 - ...stio.io_v1alpha2_instance_tcpbytesent.yaml | 32 - ...1alpha2_instance_tcpconnectionsclosed.yaml | 32 - ...1alpha2_instance_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 12 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 18 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 14 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 13 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 13 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 13 - ...v1alpha3_destinationrule_istio-policy.yaml | 19 - ...lpha3_destinationrule_istio-telemetry.yaml | 19 - ...eta1_poddisruptionbudget_istio-galley.yaml | 14 - ...disruptionbudget_istio-ingressgateway.yaml | 14 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 14 - ...eta1_poddisruptionbudget_istio-policy.yaml | 17 - ...sruptionbudget_istio-sidecar-injector.yaml | 14 - ...1_poddisruptionbudget_istio-telemetry.yaml | 17 - ...lusterrole_istio-citadel-istio-system.yaml | 42 - ...clusterrole_istio-galley-istio-system.yaml | 90 - ..._clusterrole_istio-mixer-istio-system.yaml | 48 - ...sterrole_istio-nodeagent-istio-system.yaml | 13 - ..._clusterrole_istio-pilot-istio-system.yaml | 69 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 25 - ...1_clusterrole_prometheus-istio-system.yaml | 29 - ...olebinding_istio-citadel-istio-system.yaml | 14 - ...alley-admin-role-binding-istio-system.yaml | 14 - ...mixer-admin-role-binding-istio-system.yaml | 14 - ....io_v1_clusterrolebinding_istio-multi.yaml | 12 - ...ebinding_istio-nodeagent-istio-system.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 14 - ...ector-admin-role-binding-istio-system.yaml | 15 - ...errolebinding_prometheus-istio-system.yaml | 14 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 35 - ...ost-install-role-binding-istio-system.yaml | 14 - ...pha1_servicerole_istio-ingressgateway.yaml | 9 - ...rvicerolebinding_istio-ingressgateway.yaml | 11 - ..._configmap_istio-galley-configuration.yaml | 120 - ...p_istio-install-parameters-5kmkd2f29g.yaml | 7 - ...igmap_istio-security-custom-resources.yaml | 49 - ...g_v1_configmap_istio-sidecar-injector.yaml | 405 - .../expected/~g_v1_configmap_istio.yaml | 137 - .../expected/~g_v1_configmap_prometheus.yaml | 276 - .../~g_v1_namespace_istio-system.yaml | 4 - .../expected/~g_v1_service_istio-citadel.yaml | 18 - .../expected/~g_v1_service_istio-galley.yaml | 18 - .../~g_v1_service_istio-ingressgateway.yaml | 44 - .../expected/~g_v1_service_istio-pilot.yaml | 20 - .../expected/~g_v1_service_istio-policy.yaml | 21 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 23 - .../expected/~g_v1_service_prometheus.yaml | 16 - ...account_istio-citadel-service-account.yaml | 7 - ...eaccount_istio-galley-service-account.yaml | 7 - ..._istio-ingressgateway-service-account.yaml | 7 - ...ceaccount_istio-mixer-service-account.yaml | 7 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...count_istio-nodeagent-service-account.yaml | 7 - ...ceaccount_istio-pilot-service-account.yaml | 7 - ...t_istio-security-post-install-account.yaml | 7 - ...stio-sidecar-injector-service-account.yaml | 8 - .../~g_v1_serviceaccount_prometheus.yaml | 7 - .../istio-ingress-cognito/kustomize_test.go | 15 - ....k8s.io_v1beta1_ingress_istio-ingress.yaml | 23 - .../~g_v1_configmap_istio-ingress-config.yaml | 13 - .../application/istio-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 30 - ...cedefinition_adapters.config.istio.io.yaml | 24 - ...rcedefinition_apikeys.config.istio.io.yaml | 24 - ...on_attributemanifests.config.istio.io.yaml | 24 - ...nition_authorizations.config.istio.io.yaml | 24 - ...cedefinition_bypasses.config.istio.io.yaml | 24 - ...ition_certificates.certmanager.k8s.io.yaml | 43 - ...inition_challenges.certmanager.k8s.io.yaml | 35 - ...inition_checknothings.config.istio.io.yaml | 24 - ...definition_circonuses.config.istio.io.yaml | 24 - ...finition_cloudwatches.config.istio.io.yaml | 21 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 18 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 22 - ...rcedefinition_deniers.config.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 37 - ...definition_dogstatsds.config.istio.io.yaml | 21 - ...ourcedefinition_edges.config.istio.io.yaml | 24 - ...tion_envoyfilters.networking.istio.io.yaml | 22 - ...cedefinition_fluentds.config.istio.io.yaml | 24 - ...finition_gateways.networking.istio.io.yaml | 24 - ...cedefinition_handlers.config.istio.io.yaml | 24 - ...n_httpapispecbindings.config.istio.io.yaml | 22 - ...finition_httpapispecs.config.istio.io.yaml | 22 - ...edefinition_instances.config.istio.io.yaml | 24 - ...definition_issuers.certmanager.k8s.io.yaml | 18 - ...nition_kubernetesenvs.config.istio.io.yaml | 24 - ...finition_kuberneteses.config.istio.io.yaml | 24 - ...finition_listcheckers.config.istio.io.yaml | 24 - ...efinition_listentries.config.istio.io.yaml | 24 - ...definition_logentries.config.istio.io.yaml | 45 - ...edefinition_memquotas.config.istio.io.yaml | 24 - ..._meshpolicies.authentication.istio.io.yaml | 23 - ...rcedefinition_metrics.config.istio.io.yaml | 24 - ...ourcedefinition_noops.config.istio.io.yaml | 24 - ...sourcedefinition_opas.config.istio.io.yaml | 24 - ...edefinition_orders.certmanager.k8s.io.yaml | 37 - ...tion_policies.authentication.istio.io.yaml | 22 - ...finition_prometheuses.config.istio.io.yaml | 24 - ...urcedefinition_quotas.config.istio.io.yaml | 24 - ...ion_quotaspecbindings.config.istio.io.yaml | 22 - ...definition_quotaspecs.config.istio.io.yaml | 22 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 24 - ...ourcedefinition_rbacs.config.istio.io.yaml | 24 - ...efinition_redisquotas.config.istio.io.yaml | 21 - ...nition_reportnothings.config.istio.io.yaml | 24 - ...ourcedefinition_rules.config.istio.io.yaml | 24 - ...on_serviceentries.networking.istio.io.yaml | 46 - ...ion_servicerolebindings.rbac.istio.io.yaml | 36 - ...definition_serviceroles.rbac.istio.io.yaml | 24 - ...finition_sidecars.networking.istio.io.yaml | 22 - ...edefinition_signalfxs.config.istio.io.yaml | 24 - ...finition_solarwindses.config.istio.io.yaml | 24 - ...finition_stackdrivers.config.istio.io.yaml | 24 - ...rcedefinition_statsds.config.istio.io.yaml | 24 - ...urcedefinition_stdios.config.istio.io.yaml | 24 - ...edefinition_templates.config.istio.io.yaml | 24 - ...definition_tracespans.config.istio.io.yaml | 24 - ...n_virtualservices.networking.istio.io.yaml | 41 - ...rcedefinition_zipkins.config.istio.io.yaml | 21 - .../expected/apps_v1_deployment_grafana.yaml | 152 - .../apps_v1_deployment_istio-citadel.yaml | 90 - ...pps_v1_deployment_istio-egressgateway.yaml | 171 - .../apps_v1_deployment_istio-galley.yaml | 133 - ...ps_v1_deployment_istio-ingressgateway.yaml | 177 - .../apps_v1_deployment_istio-pilot.yaml | 175 - .../apps_v1_deployment_istio-policy.yaml | 168 - ..._v1_deployment_istio-sidecar-injector.yaml | 125 - .../apps_v1_deployment_istio-telemetry.yaml | 172 - .../apps_v1_deployment_istio-tracing.yaml | 99 - .../expected/apps_v1_deployment_kiali.yaml | 97 - .../apps_v1_deployment_prometheus.yaml | 93 - ...ntalpodautoscaler_istio-egressgateway.yaml | 22 - ...talpodautoscaler_istio-ingressgateway.yaml | 22 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 22 - ..._horizontalpodautoscaler_istio-policy.yaml | 22 - ...rizontalpodautoscaler_istio-telemetry.yaml | 22 - ...ch_v1_job_istio-cleanup-secrets-1.1.6.yaml | 72 - ..._job_istio-grafana-post-install-1.1.6.yaml | 72 - ...job_istio-security-post-install-1.1.6.yaml | 73 - ...v1alpha2_attributemanifest_istioproxy.yaml | 138 - ...v1alpha2_attributemanifest_kubernetes.yaml | 64 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 13 - ....istio.io_v1alpha2_handler_prometheus.yaml | 216 - ...onfig.istio.io_v1alpha2_handler_stdio.yaml | 14 - ...tio.io_v1alpha2_kubernetes_attributes.yaml | 37 - ....istio.io_v1alpha2_logentry_accesslog.yaml | 58 - ...tio.io_v1alpha2_logentry_tcpaccesslog.yaml | 43 - ...istio.io_v1alpha2_metric_requestcount.yaml | 36 - ...io.io_v1alpha2_metric_requestduration.yaml | 36 - ....istio.io_v1alpha2_metric_requestsize.yaml | 36 - ...istio.io_v1alpha2_metric_responsesize.yaml | 36 - ...io.io_v1alpha2_metric_tcpbytereceived.yaml | 32 - ....istio.io_v1alpha2_metric_tcpbytesent.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsclosed.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 15 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 20 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 17 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 16 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 16 - .../config.istio.io_v1alpha2_rule_stdio.yaml | 16 - ...onfig.istio.io_v1alpha2_rule_stdiotcp.yaml | 16 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 16 - ...v1alpha3_destinationrule_istio-policy.yaml | 17 - ...lpha3_destinationrule_istio-telemetry.yaml | 17 - ...ddisruptionbudget_istio-egressgateway.yaml | 18 - ...eta1_poddisruptionbudget_istio-galley.yaml | 18 - ...disruptionbudget_istio-ingressgateway.yaml | 18 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 18 - ...eta1_poddisruptionbudget_istio-policy.yaml | 21 - ...1_poddisruptionbudget_istio-telemetry.yaml | 21 - ...lusterrole_istio-citadel-istio-system.yaml | 44 - ...le_istio-cleanup-secrets-istio-system.yaml | 21 - ...role_istio-egressgateway-istio-system.yaml | 21 - ...clusterrole_istio-galley-istio-system.yaml | 85 - ...tio-grafana-post-install-istio-system.yaml | 16 - ...ole_istio-ingressgateway-istio-system.yaml | 21 - ..._clusterrole_istio-mixer-istio-system.yaml | 51 - ..._clusterrole_istio-pilot-istio-system.yaml | 73 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 28 - ...on.k8s.io_v1_clusterrole_kiali-viewer.yaml | 124 - ...orization.k8s.io_v1_clusterrole_kiali.yaml | 134 - ...1_clusterrole_prometheus-istio-system.yaml | 32 - ...olebinding_istio-citadel-istio-system.yaml | 17 - ...ng_istio-cleanup-secrets-istio-system.yaml | 21 - ...ding_istio-egressgateway-istio-system.yaml | 17 - ...alley-admin-role-binding-istio-system.yaml | 17 - ...ost-install-role-binding-istio-system.yaml | 17 - ...ing_istio-ingressgateway-istio-system.yaml | 17 - ...kiali-admin-role-binding-istio-system.yaml | 17 - ...mixer-admin-role-binding-istio-system.yaml | 17 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 17 - ...ector-admin-role-binding-istio-system.yaml | 18 - ...errolebinding_prometheus-istio-system.yaml | 17 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 38 - ...ost-install-role-binding-istio-system.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 123 - ...iguration-dashboards-galley-dashboard.yaml | 341 - ...ation-dashboards-istio-mesh-dashboard.yaml | 229 - ...ashboards-istio-performance-dashboard.yaml | 150 - ...on-dashboards-istio-service-dashboard.yaml | 795 -- ...n-dashboards-istio-workload-dashboard.yaml | 744 -- ...figuration-dashboards-mixer-dashboard.yaml | 359 - ...figuration-dashboards-pilot-dashboard.yaml | 307 - ...figmap_istio-grafana-custom-resources.yaml | 59 - .../~g_v1_configmap_istio-grafana.yaml | 34 - ...igmap_istio-security-custom-resources.yaml | 58 - ...g_v1_configmap_istio-sidecar-injector.yaml | 102 - .../expected/~g_v1_configmap_istio.yaml | 77 - .../expected/~g_v1_configmap_kiali.yaml | 14 - .../expected/~g_v1_configmap_prometheus.yaml | 313 - .../~g_v1_namespace_istio-system.yaml | 6 - .../expected/~g_v1_secret_kiali.yaml | 14 - .../expected/~g_v1_service_grafana.yaml | 19 - .../expected/~g_v1_service_istio-citadel.yaml | 21 - .../~g_v1_service_istio-egressgateway.yaml | 25 - .../expected/~g_v1_service_istio-galley.yaml | 21 - .../~g_v1_service_istio-ingressgateway.yaml | 48 - .../expected/~g_v1_service_istio-pilot.yaml | 23 - .../expected/~g_v1_service_istio-policy.yaml | 24 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 26 - .../expected/~g_v1_service_jaeger-agent.yaml | 28 - .../~g_v1_service_jaeger-collector.yaml | 24 - .../expected/~g_v1_service_jaeger-query.yaml | 19 - .../expected/~g_v1_service_kiali.yaml | 17 - .../expected/~g_v1_service_prometheus.yaml | 19 - .../expected/~g_v1_service_tracing.yaml | 19 - .../expected/~g_v1_service_zipkin.yaml | 19 - ...account_istio-citadel-service-account.yaml | 10 - ...istio-cleanup-secrets-service-account.yaml | 14 - ...t_istio-egressgateway-service-account.yaml | 10 - ...eaccount_istio-galley-service-account.yaml | 10 - ...nt_istio-grafana-post-install-account.yaml | 10 - ..._istio-ingressgateway-service-account.yaml | 10 - ...ceaccount_istio-mixer-service-account.yaml | 10 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...ceaccount_istio-pilot-service-account.yaml | 10 - ...t_istio-security-post-install-account.yaml | 10 - ...stio-sidecar-injector-service-account.yaml | 11 - ..._serviceaccount_kiali-service-account.yaml | 10 - .../~g_v1_serviceaccount_prometheus.yaml | 10 - .../aws/application/istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - ...configmap_istio-parameters-797cg68672.yaml | 10 - .../jupyter-web-app/kustomize_test.go | 15 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ...deployment_jupyter-web-app-deployment.yaml | 46 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...app-jupyter-web-app-config-24bth2gbkc.yaml | 201 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - ...count_jupyter-web-app-service-account.yaml | 8 - .../oidc-authservice/kustomize_test.go | 15 - ..._v1beta1_application_oidc-authservice.yaml | 47 - .../apps_v1_statefulset_authservice.yaml | 70 - ....io_v1alpha3_envoyfilter_authn-filter.yaml | 36 - ...configmap_oidc-authservice-parameters.yaml | 20 - ...persistentvolumeclaim_authservice-pvc.yaml | 14 - .../expected/~g_v1_service_authservice.yaml | 19 - .../application/spartakus/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_spartakus.yaml | 37 - ...pps_v1_deployment_spartakus-volunteer.yaml | 41 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 17 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 17 - .../~g_v1_configmap_spartakus-config.yaml | 12 - .../~g_v1_serviceaccount_spartakus.yaml | 10 - tests/stacks/aws/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...tating-webhook-configuration-kubeflow.yaml | 86 - ...dating-webhook-configuration-kubeflow.yaml | 86 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...sourcedefinition_mpijobs.kubeflow.org.yaml | 156 - ...esourcedefinition_mxjobs.kubeflow.org.yaml | 58 - ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ...pplication_aws-alb-ingress-controller.yaml | 40 - ..._application_aws-nvidia-device-plugin.yaml | 40 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - ...s.io_v1beta1_application_mpi-operator.yaml | 48 - ...io_v1beta1_application_mxnet-operator.yaml | 51 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...eta1_application_seldon-core-operator.yaml | 46 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...monset_nvidia-device-plugin-daemonset.yaml | 47 - ...ployment_admission-webhook-deployment.yaml | 42 - ..._v1_deployment_alb-ingress-controller.yaml | 37 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 46 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../apps_v1_deployment_mpi-operator.yaml | 38 - .../apps_v1_deployment_mxnet-operator.yaml | 42 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ..._deployment_seldon-controller-manager.yaml | 180 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...ubeflow.org_v1beta1_profile_anonymous.yaml | 9 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...v1_clusterrole_alb-ingress-controller.yaml | 38 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...v1_clusterrole_kubeflow-mpijobs-admin.yaml | 14 - ..._v1_clusterrole_kubeflow-mpijobs-edit.yaml | 25 - ..._v1_clusterrole_kubeflow-mpijobs-view.yaml | 19 - ..._v1_clusterrole_kubeflow-mxjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-mxjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-mxjobs-view.yaml | 19 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...on.k8s.io_v1_clusterrole_mpi-operator.yaml | 107 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...terrolebinding_alb-ingress-controller.yaml | 15 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...io_v1_clusterrolebinding_mpi-operator.yaml | 17 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ...io_v1beta1_clusterrole_mxnet-operator.yaml | 52 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...ta1_clusterrolebinding_mxnet-operator.yaml | 17 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...map_aws-alb-ingress-controller-config.yaml | 10 - ...nfigmap_centraldashboard-links-config.yaml | 113 - ...map_default-install-config-h877hbtmf7.yaml | 8 - ...app-jupyter-web-app-config-24bth2gbkc.yaml | 201 - .../~g_v1_configmap_katib-config.yaml | 66 - .../~g_v1_configmap_kubeflow-config.yaml | 11 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - .../~g_v1_configmap_mpi-operator-config.yaml | 12 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 22 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_seldon-webhook-service.yaml | 22 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - ...serviceaccount_alb-ingress-controller.yaml | 8 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 8 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_mpi-operator.yaml | 10 - .../~g_v1_serviceaccount_mxnet-operator.yaml | 10 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 7 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - .../kustomize_test.go | 15 - ..._v1alpha3_envoyfilter_add-user-filter.yaml | 29 - .../centraldashboard/kustomize_test.go | 15 - ..._v1beta1_application_centraldashboard.yaml | 53 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...nfigmap_centraldashboard-links-config.yaml | 73 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 9 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 35 - ...ookconfiguration_cert-manager-webhook.yaml | 34 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 19 - ...s.io_v1beta1_application_cert-manager.yaml | 41 - ...v1_deployment_cert-manager-cainjector.yaml | 41 - ...ps_v1_deployment_cert-manager-webhook.yaml | 50 - .../apps_v1_deployment_cert-manager.yaml | 54 - ...erissuer_kubeflow-self-signing-issuer.yaml | 11 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 24 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 23 - ...ert-manager-webhook:webhook-requester.yaml | 19 - ...1_clusterrole_cert-manager-cainjector.yaml | 63 - ..._cert-manager-controller-certificates.yaml | 64 - ...le_cert-manager-controller-challenges.yaml | 86 - ...ert-manager-controller-clusterissuers.yaml | 43 - ..._cert-manager-controller-ingress-shim.yaml | 51 - ...rrole_cert-manager-controller-issuers.yaml | 43 - ...errole_cert-manager-controller-orders.yaml | 63 - ...errolebinding_cert-manager-cainjector.yaml | 17 - ..._cert-manager-controller-certificates.yaml | 17 - ...ng_cert-manager-controller-challenges.yaml | 17 - ...ert-manager-controller-clusterissuers.yaml | 17 - ..._cert-manager-controller-ingress-shim.yaml | 17 - ...nding_cert-manager-controller-issuers.yaml | 17 - ...inding_cert-manager-controller-orders.yaml | 17 - ...g_cert-manager-webhook:auth-delegator.yaml | 18 - ..._v1_configmap_cert-manager-parameters.yaml | 11 - .../~g_v1_namespace_cert-manager.yaml | 8 - .../~g_v1_service_cert-manager-webhook.yaml | 21 - .../expected/~g_v1_service_cert-manager.yaml | 21 - ...erviceaccount_cert-manager-cainjector.yaml | 10 - ...1_serviceaccount_cert-manager-webhook.yaml | 10 - .../~g_v1_serviceaccount_cert-manager.yaml | 10 - .../istio-1-3-1-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 27 - ...cedefinition_adapters.config.istio.io.yaml | 23 - ...on_attributemanifests.config.istio.io.yaml | 23 - ...n_authorizationpolicies.rbac.istio.io.yaml | 22 - ...ition_certificates.certmanager.k8s.io.yaml | 42 - ...inition_challenges.certmanager.k8s.io.yaml | 34 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 17 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 36 - ...tion_envoyfilters.networking.istio.io.yaml | 21 - ...finition_gateways.networking.istio.io.yaml | 23 - ...cedefinition_handlers.config.istio.io.yaml | 23 - ...n_httpapispecbindings.config.istio.io.yaml | 21 - ...finition_httpapispecs.config.istio.io.yaml | 21 - ...edefinition_instances.config.istio.io.yaml | 23 - ...definition_issuers.certmanager.k8s.io.yaml | 17 - ..._meshpolicies.authentication.istio.io.yaml | 22 - ...edefinition_orders.certmanager.k8s.io.yaml | 36 - ...tion_policies.authentication.istio.io.yaml | 21 - ...ion_quotaspecbindings.config.istio.io.yaml | 21 - ...definition_quotaspecs.config.istio.io.yaml | 21 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 23 - ...ourcedefinition_rules.config.istio.io.yaml | 23 - ...on_serviceentries.networking.istio.io.yaml | 45 - ...ion_servicerolebindings.rbac.istio.io.yaml | 35 - ...definition_serviceroles.rbac.istio.io.yaml | 23 - ...finition_sidecars.networking.istio.io.yaml | 21 - ...edefinition_templates.config.istio.io.yaml | 23 - ...n_virtualservices.networking.istio.io.yaml | 40 - .../apps_v1_daemonset_istio-nodeagent.yaml | 87 - .../apps_v1_deployment_istio-citadel.yaml | 78 - .../apps_v1_deployment_istio-galley.yaml | 122 - ...ps_v1_deployment_istio-ingressgateway.yaml | 202 - .../apps_v1_deployment_istio-pilot.yaml | 185 - .../apps_v1_deployment_istio-policy.yaml | 175 - ..._v1_deployment_istio-sidecar-injector.yaml | 117 - .../apps_v1_deployment_istio-telemetry.yaml | 185 - .../apps_v1_deployment_prometheus.yaml | 87 - ...talpodautoscaler_istio-ingressgateway.yaml | 20 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 19 - ..._horizontalpodautoscaler_istio-policy.yaml | 19 - ...rizontalpodautoscaler_istio-telemetry.yaml | 19 - ...post-install-release-1.3-latest-daily.yaml | 64 - ...v1alpha2_attributemanifest_istioproxy.yaml | 137 - ...v1alpha2_attributemanifest_kubernetes.yaml | 61 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 9 - ....istio.io_v1alpha2_handler_prometheus.yaml | 213 - ...istio.io_v1alpha2_instance_attributes.yaml | 36 - ...tio.io_v1alpha2_instance_requestcount.yaml | 36 - ....io_v1alpha2_instance_requestduration.yaml | 36 - ...stio.io_v1alpha2_instance_requestsize.yaml | 36 - ...tio.io_v1alpha2_instance_responsesize.yaml | 36 - ....io_v1alpha2_instance_tcpbytereceived.yaml | 32 - ...stio.io_v1alpha2_instance_tcpbytesent.yaml | 32 - ...1alpha2_instance_tcpconnectionsclosed.yaml | 32 - ...1alpha2_instance_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 12 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 18 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 14 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 13 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 13 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 13 - ...v1alpha3_destinationrule_istio-policy.yaml | 19 - ...lpha3_destinationrule_istio-telemetry.yaml | 19 - ...eta1_poddisruptionbudget_istio-galley.yaml | 14 - ...disruptionbudget_istio-ingressgateway.yaml | 14 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 14 - ...eta1_poddisruptionbudget_istio-policy.yaml | 17 - ...sruptionbudget_istio-sidecar-injector.yaml | 14 - ...1_poddisruptionbudget_istio-telemetry.yaml | 17 - ...lusterrole_istio-citadel-istio-system.yaml | 42 - ...clusterrole_istio-galley-istio-system.yaml | 90 - ..._clusterrole_istio-mixer-istio-system.yaml | 48 - ...sterrole_istio-nodeagent-istio-system.yaml | 13 - ..._clusterrole_istio-pilot-istio-system.yaml | 69 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 25 - ...1_clusterrole_prometheus-istio-system.yaml | 29 - ...olebinding_istio-citadel-istio-system.yaml | 14 - ...alley-admin-role-binding-istio-system.yaml | 14 - ...mixer-admin-role-binding-istio-system.yaml | 14 - ....io_v1_clusterrolebinding_istio-multi.yaml | 12 - ...ebinding_istio-nodeagent-istio-system.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 14 - ...ector-admin-role-binding-istio-system.yaml | 15 - ...errolebinding_prometheus-istio-system.yaml | 14 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 35 - ...ost-install-role-binding-istio-system.yaml | 14 - ...pha1_servicerole_istio-ingressgateway.yaml | 9 - ...rvicerolebinding_istio-ingressgateway.yaml | 11 - ..._configmap_istio-galley-configuration.yaml | 120 - ...p_istio-install-parameters-5kmkd2f29g.yaml | 7 - ...igmap_istio-security-custom-resources.yaml | 49 - ...g_v1_configmap_istio-sidecar-injector.yaml | 405 - .../expected/~g_v1_configmap_istio.yaml | 137 - .../expected/~g_v1_configmap_prometheus.yaml | 276 - .../~g_v1_namespace_istio-system.yaml | 4 - .../expected/~g_v1_service_istio-citadel.yaml | 18 - .../expected/~g_v1_service_istio-galley.yaml | 18 - .../~g_v1_service_istio-ingressgateway.yaml | 44 - .../expected/~g_v1_service_istio-pilot.yaml | 20 - .../expected/~g_v1_service_istio-policy.yaml | 21 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 23 - .../expected/~g_v1_service_prometheus.yaml | 16 - ...account_istio-citadel-service-account.yaml | 7 - ...eaccount_istio-galley-service-account.yaml | 7 - ..._istio-ingressgateway-service-account.yaml | 7 - ...ceaccount_istio-mixer-service-account.yaml | 7 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...count_istio-nodeagent-service-account.yaml | 7 - ...ceaccount_istio-pilot-service-account.yaml | 7 - ...t_istio-security-post-install-account.yaml | 7 - ...stio-sidecar-injector-service-account.yaml | 8 - .../~g_v1_serviceaccount_prometheus.yaml | 7 - .../azure/application/istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - ...configmap_istio-parameters-t6hhgfg9k2.yaml | 10 - .../jupyter-web-app/base/kustomize_test.go | 15 - ...deployment_jupyter-web-app-deployment.yaml | 63 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - ...count_jupyter-web-app-service-account.yaml | 10 - .../jupyter-web-app/kustomize_test.go | 15 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ...deployment_jupyter-web-app-deployment.yaml | 63 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - ...count_jupyter-web-app-service-account.yaml | 10 - .../oidc-authservice/kustomize_test.go | 15 - ..._v1beta1_application_oidc-authservice.yaml | 47 - .../apps_v1_statefulset_authservice.yaml | 70 - ....io_v1alpha3_envoyfilter_authn-filter.yaml | 36 - ...configmap_oidc-authservice-parameters.yaml | 20 - ...persistentvolumeclaim_authservice-pvc.yaml | 14 - .../expected/~g_v1_service_authservice.yaml | 19 - .../spark-operator/kustomize_test.go | 15 - ...parkapplications.sparkoperator.k8s.io.yaml | 2550 ------ ...parkapplications.sparkoperator.k8s.io.yaml | 2532 ------ ...io_v1beta1_application_spark-operator.yaml | 42 - ...eployment_spark-operatorsparkoperator.yaml | 51 - ...clusterrole_spark-operatoroperator-cr.yaml | 76 - ...nding_spark-operatorsparkoperator-crb.yaml | 16 - ...s.io_v1_role_spark-operatorspark-role.yaml | 23 - ...ding_spark-operatorspark-role-binding.yaml | 17 - ...viceaccount_spark-operatoroperator-sa.yaml | 9 - ...v1_serviceaccount_spark-operatorspark.yaml | 9 - .../application/spartakus/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_spartakus.yaml | 37 - ...pps_v1_deployment_spartakus-volunteer.yaml | 41 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 17 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 17 - .../~g_v1_configmap_spartakus-config.yaml | 12 - .../~g_v1_serviceaccount_spartakus.yaml | 10 - tests/stacks/azure/kustomize_test.go | 15 - tests/stacks/azure/metadata/kustomize_test.go | 15 - ...default_apps_v1_deployment_deployment.yaml | 34 - ...map_metadata-db-parameters-hc59m6d49g.yaml | 11 - ...secret_metadata-db-secrets-c9d6622b8k.yaml | 10 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ..._~g_v1_service_metadata-envoy-service.yaml | 17 - ...w_~g_v1_service_metadata-grpc-service.yaml | 17 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...inferenceservice.serving.kubeflow.org.yaml | 57 - ...istio.networking.internal.knative.dev.yaml | 23 - ...iguration_webhook.serving.knative.dev.yaml | 19 - ...istio.networking.internal.knative.dev.yaml | 23 - ...on_config.webhook.serving.knative.dev.yaml | 23 - ...inferenceservice.serving.kubeflow.org.yaml | 31 - ...alidation.webhook.serving.knative.dev.yaml | 19 - ...cates.networking.internal.knative.dev.yaml | 32 - ...on_configurations.serving.knative.dev.yaml | 61 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...n_images.caching.internal.knative.dev.yaml | 24 - ...nferenceservices.serving.kubeflow.org.yaml | 3941 --------- ...esses.networking.internal.knative.dev.yaml | 36 - ...rics.autoscaling.internal.knative.dev.yaml | 30 - ...sourcedefinition_mpijobs.kubeflow.org.yaml | 156 - ...esourcedefinition_mxjobs.kubeflow.org.yaml | 58 - ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...lers.autoscaling.internal.knative.dev.yaml | 42 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...inition_revisions.serving.knative.dev.yaml | 62 - ...definition_routes.serving.knative.dev.yaml | 57 - ...parkapplications.sparkoperator.k8s.io.yaml | 2550 ------ ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...vices.networking.internal.knative.dev.yaml | 47 - ...finition_services.serving.knative.dev.yaml | 65 - ...parkapplications.sparkoperator.k8s.io.yaml | 2532 ------ ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ....k8s.io_v1beta1_application_kfserving.yaml | 46 - ...eta1_application_knative-serving-crds.yaml | 32 - ...1_application_knative-serving-install.yaml | 32 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - ...s.io_v1beta1_application_mpi-operator.yaml | 48 - ...io_v1beta1_application_mxnet-operator.yaml | 51 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...io_v1beta1_application_spark-operator.yaml | 42 - ....k8s.io_v1beta1_application_spartakus.yaml | 37 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - .../apps_v1_deployment_activator.yaml | 86 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - .../apps_v1_deployment_autoscaler.yaml | 77 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_centraldashboard.yaml | 55 - .../apps_v1_deployment_controller.yaml | 57 - .../apps_v1_deployment_istio-webhook.yaml | 63 - ...deployment_jupyter-web-app-deployment.yaml | 63 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 32 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 103 - .../apps_v1_deployment_mpi-operator.yaml | 38 - .../apps_v1_deployment_mxnet-operator.yaml | 42 - .../expected/apps_v1_deployment_mysql.yaml | 40 - .../apps_v1_deployment_networking-istio.yaml | 59 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ...eployment_spark-operatorsparkoperator.yaml | 51 - ...pps_v1_deployment_spartakus-volunteer.yaml | 41 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - .../expected/apps_v1_deployment_webhook.yaml | 61 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...tefulset_kfserving-controller-manager.yaml | 80 - ...ta1_horizontalpodautoscaler_activator.yaml | 22 - ...native.dev_v1alpha1_image_queue-proxy.yaml | 12 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ....io_v1alpha2_certificate_serving-cert.yaml | 18 - ....io_v1alpha2_issuer_selfsigned-issuer.yaml | 12 - ...ubeflow.org_v1beta1_profile_anonymous.yaml | 9 - ...1alpha3_gateway_cluster-local-gateway.yaml | 21 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...v1_clusterrole_kfserving-manager-role.yaml | 169 - ...o_v1_clusterrole_kfserving-proxy-role.yaml | 22 - ..._knative-serving-addressable-resolver.yaml | 22 - ..._v1_clusterrole_knative-serving-admin.yaml | 14 - ...o_v1_clusterrole_knative-serving-core.yaml | 128 - ..._v1_clusterrole_knative-serving-istio.yaml | 25 - ...role_knative-serving-namespaced-admin.yaml | 20 - ...rrole_knative-serving-namespaced-edit.yaml | 23 - ...rrole_knative-serving-namespaced-view.yaml | 22 - ...e_knative-serving-podspecable-binding.yaml | 20 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ..._clusterrole_kubeflow-kfserving-admin.yaml | 15 - ...1_clusterrole_kubeflow-kfserving-edit.yaml | 25 - ...1_clusterrole_kubeflow-kfserving-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...v1_clusterrole_kubeflow-mpijobs-admin.yaml | 14 - ..._v1_clusterrole_kubeflow-mpijobs-edit.yaml | 25 - ..._v1_clusterrole_kubeflow-mpijobs-view.yaml | 19 - ..._v1_clusterrole_kubeflow-mxjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-mxjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-mxjobs-view.yaml | 19 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...on.k8s.io_v1_clusterrole_mpi-operator.yaml | 107 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...clusterrole_spark-operatoroperator-cr.yaml | 76 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...binding_kfserving-manager-rolebinding.yaml | 17 - ...lebinding_kfserving-proxy-rolebinding.yaml | 17 - ...ding_knative-serving-controller-admin.yaml | 17 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...io_v1_clusterrolebinding_mpi-operator.yaml | 17 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...nding_spark-operatorsparkoperator-crb.yaml | 16 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...n.k8s.io_v1_role_leader-election-role.yaml | 37 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...s.io_v1_role_spark-operatorspark-role.yaml | 23 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ...lebinding_leader-election-rolebinding.yaml | 18 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ding_spark-operatorspark-role-binding.yaml | 17 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...io_v1beta1_clusterrole_mxnet-operator.yaml | 52 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 17 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...ta1_clusterrolebinding_mxnet-operator.yaml | 17 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...alpha1_servicerole_istio-service-role.yaml | 15 - ...olebinding_istio-service-role-binding.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 73 - .../~g_v1_configmap_config-autoscaler.yaml | 149 - .../~g_v1_configmap_config-defaults.yaml | 81 - .../~g_v1_configmap_config-deployment.yaml | 30 - .../~g_v1_configmap_config-domain.yaml | 47 - .../expected/~g_v1_configmap_config-gc.yaml | 43 - .../~g_v1_configmap_config-istio.yaml | 59 - ...g_v1_configmap_config-leader-election.yaml | 57 - .../~g_v1_configmap_config-logging.yaml | 63 - .../~g_v1_configmap_config-network.yaml | 94 - .../~g_v1_configmap_config-observability.yaml | 27 - .../~g_v1_configmap_config-tracing.yaml | 45 - ...map_default-install-config-h877hbtmf7.yaml | 8 - ..._v1_configmap_inferenceservice-config.yaml | 90 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - .../~g_v1_configmap_mpi-operator-config.yaml | 12 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_spartakus-config.yaml | 12 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 23 - .../~g_v1_namespace_knative-serving.yaml | 9 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_istio-webhook-certs.yaml | 10 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - ...ecret_kfserving-webhook-server-secret.yaml | 10 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_secret_webhook-certs.yaml | 10 - .../~g_v1_service_activator-service.yaml | 31 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_autoscaler.yaml | 30 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - .../expected/~g_v1_service_controller.yaml | 24 - .../expected/~g_v1_service_istio-webhook.yaml | 27 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...ng-controller-manager-metrics-service.yaml | 28 - ..._kfserving-controller-manager-service.yaml | 22 - ...vice_kfserving-webhook-server-service.yaml | 20 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_tf-job-operator.yaml | 25 - .../expected/~g_v1_service_webhook.yaml | 27 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - .../~g_v1_serviceaccount_controller.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 10 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_mpi-operator.yaml | 10 - .../~g_v1_serviceaccount_mxnet-operator.yaml | 10 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 7 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - ...viceaccount_spark-operatoroperator-sa.yaml | 9 - ...v1_serviceaccount_spark-operatorspark.yaml | 9 - .../~g_v1_serviceaccount_spartakus.yaml | 10 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - tests/stacks/examples/alice/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...inferenceservice.serving.kubeflow.org.yaml | 57 - ...inferenceservice.serving.kubeflow.org.yaml | 31 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...nferenceservices.serving.kubeflow.org.yaml | 3941 --------- ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ....k8s.io_v1beta1_application_kfserving.yaml | 46 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 46 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...tefulset_kfserving-controller-manager.yaml | 80 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ....io_v1alpha2_certificate_serving-cert.yaml | 18 - ....io_v1alpha2_issuer_selfsigned-issuer.yaml | 12 - ...ubeflow.org_v1beta1_profile_anonymous.yaml | 9 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...v1_clusterrole_kfserving-manager-role.yaml | 169 - ...o_v1_clusterrole_kfserving-proxy-role.yaml | 22 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ..._clusterrole_kubeflow-kfserving-admin.yaml | 15 - ...1_clusterrole_kubeflow-kfserving-edit.yaml | 25 - ...1_clusterrole_kubeflow-kfserving-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...binding_kfserving-manager-rolebinding.yaml | 17 - ...lebinding_kfserving-proxy-rolebinding.yaml | 17 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...n.k8s.io_v1_role_leader-election-role.yaml | 37 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ...lebinding_leader-election-rolebinding.yaml | 18 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...map_default-install-config-h877hbtmf7.yaml | 8 - ..._v1_configmap_inferenceservice-config.yaml | 90 - ...app-jupyter-web-app-config-5cc2fchd2g.yaml | 26 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-bmh8k74f52.yaml | 11 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...eline-minio-install-config-c42bb75m6g.yaml | 11 - ...eline-mysql-install-config-24c6km7cgg.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 22 - .../~g_v1_persistentvolume_minio-pv.yaml | 15 - .../~g_v1_persistentvolume_mysql-pv.yaml | 16 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 16 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 17 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - ...ecret_kfserving-webhook-server-secret.yaml | 10 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...ng-controller-manager-metrics-service.yaml | 28 - ..._kfserving-controller-manager-service.yaml | 22 - ...vice_kfserving-webhook-server-service.yaml | 20 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 8 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 10 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 10 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 10 - ...t_profiles-controller-service-account.yaml | 9 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - tests/stacks/gcp/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...inferenceservice.serving.kubeflow.org.yaml | 57 - ...inferenceservice.serving.kubeflow.org.yaml | 31 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...nferenceservices.serving.kubeflow.org.yaml | 3941 --------- ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ....k8s.io_v1beta1_application_kfserving.yaml | 46 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 46 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...tefulset_kfserving-controller-manager.yaml | 80 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ....io_v1alpha2_certificate_serving-cert.yaml | 18 - ....io_v1alpha2_issuer_selfsigned-issuer.yaml | 12 - ...ubeflow.org_v1beta1_profile_anonymous.yaml | 9 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...v1_clusterrole_kfserving-manager-role.yaml | 169 - ...o_v1_clusterrole_kfserving-proxy-role.yaml | 22 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ..._clusterrole_kubeflow-kfserving-admin.yaml | 15 - ...1_clusterrole_kubeflow-kfserving-edit.yaml | 25 - ...1_clusterrole_kubeflow-kfserving-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...binding_kfserving-manager-rolebinding.yaml | 17 - ...lebinding_kfserving-proxy-rolebinding.yaml | 17 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...n.k8s.io_v1_role_leader-election-role.yaml | 37 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ...lebinding_leader-election-rolebinding.yaml | 18 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...map_default-install-config-h877hbtmf7.yaml | 8 - ..._v1_configmap_inferenceservice-config.yaml | 90 - ...app-jupyter-web-app-config-8kcgd8t8th.yaml | 196 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-c644m77455.yaml | 9 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...eline-minio-install-config-c42bb75m6g.yaml | 11 - ...eline-mysql-install-config-24c6km7cgg.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 22 - .../~g_v1_persistentvolume_minio-pv.yaml | 15 - .../~g_v1_persistentvolume_mysql-pv.yaml | 16 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 16 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 17 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - ...ecret_kfserving-webhook-server-secret.yaml | 10 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...ng-controller-manager-metrics-service.yaml | 28 - ..._kfserving-controller-manager-service.yaml | 22 - ...vice_kfserving-webhook-server-service.yaml | 20 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 8 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 10 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 10 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 10 - ...t_profiles-controller-service-account.yaml | 9 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - tests/stacks/generic/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 46 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 32 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 103 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...ubeflow.org_v1beta1_profile_anonymous.yaml | 9 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...map_default-install-config-h877hbtmf7.yaml | 8 - ...app-jupyter-web-app-config-8kcgd8t8th.yaml | 196 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-988m2m9m87.yaml | 9 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 22 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 8 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 7 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - .../kustomize_test.go | 15 - ..._v1alpha3_envoyfilter_add-user-filter.yaml | 20 - .../admission-webhook/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...-webhook-admission-webhook-parameters.yaml | 14 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ..._v1_service_admission-webhook-service.yaml | 19 - ...unt_admission-webhook-service-account.yaml | 10 - .../ibm/application/argo/kustomize_test.go | 15 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 23 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - .../application/bootstrap/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_bootstrap.yaml | 37 - ...ission-webhook-bootstrap-stateful-set.yaml | 42 - ...ission-webhook-bootstrap-cluster-role.yaml | 28 - ...ebhook-bootstrap-cluster-role-binding.yaml | 16 - ...dmission-webhook-bootstrap-config-map.yaml | 139 - ...ion-webhook-bootstrap-service-account.yaml | 9 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 9 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 35 - ...ookconfiguration_cert-manager-webhook.yaml | 34 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 19 - ...s.io_v1beta1_application_cert-manager.yaml | 41 - ...v1_deployment_cert-manager-cainjector.yaml | 41 - ...ps_v1_deployment_cert-manager-webhook.yaml | 50 - .../apps_v1_deployment_cert-manager.yaml | 54 - ...erissuer_kubeflow-self-signing-issuer.yaml | 11 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 24 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 23 - ...ert-manager-webhook:webhook-requester.yaml | 19 - ...1_clusterrole_cert-manager-cainjector.yaml | 63 - ..._cert-manager-controller-certificates.yaml | 64 - ...le_cert-manager-controller-challenges.yaml | 86 - ...ert-manager-controller-clusterissuers.yaml | 43 - ..._cert-manager-controller-ingress-shim.yaml | 51 - ...rrole_cert-manager-controller-issuers.yaml | 43 - ...errole_cert-manager-controller-orders.yaml | 63 - ...errolebinding_cert-manager-cainjector.yaml | 17 - ..._cert-manager-controller-certificates.yaml | 17 - ...ng_cert-manager-controller-challenges.yaml | 17 - ...ert-manager-controller-clusterissuers.yaml | 17 - ..._cert-manager-controller-ingress-shim.yaml | 17 - ...nding_cert-manager-controller-issuers.yaml | 17 - ...inding_cert-manager-controller-orders.yaml | 17 - ...g_cert-manager-webhook:auth-delegator.yaml | 18 - ..._v1_configmap_cert-manager-parameters.yaml | 11 - .../~g_v1_namespace_cert-manager.yaml | 8 - .../~g_v1_service_cert-manager-webhook.yaml | 21 - .../expected/~g_v1_service_cert-manager.yaml | 21 - ...erviceaccount_cert-manager-cainjector.yaml | 10 - ...1_serviceaccount_cert-manager-webhook.yaml | 10 - .../~g_v1_serviceaccount_cert-manager.yaml | 10 - .../kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 185 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...onfigmap_cluster-local-gateway-config.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../cluster-local-gateway/kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 164 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...le_cluster-local-gateway-istio-system.yaml | 19 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ...ng_cluster-local-gateway-istio-system.yaml | 15 - ...onfigmap_cluster-local-gateway-config.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../application/dex-auth/kustomize_test.go | 15 - ...cedefinition_authcodes.dex.coreos.com.yaml | 13 - .../expected/apps_v1_deployment_dex.yaml | 38 - ....istio.io_v1alpha3_virtualservice_dex.yaml | 19 - ...zation.k8s.io_v1beta1_clusterrole_dex.yaml | 17 - ...k8s.io_v1beta1_clusterrolebinding_dex.yaml | 12 - .../~g_v1_configmap_dex-parameters.yaml | 23 - .../expected/~g_v1_configmap_dex.yaml | 25 - .../expected/~g_v1_namespace_auth.yaml | 4 - .../test_data/expected/~g_v1_service_dex.yaml | 15 - .../expected/~g_v1_serviceaccount_dex.yaml | 5 - .../istio-1-3-1-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 27 - ...cedefinition_adapters.config.istio.io.yaml | 23 - ...on_attributemanifests.config.istio.io.yaml | 23 - ...n_authorizationpolicies.rbac.istio.io.yaml | 22 - ...ition_certificates.certmanager.k8s.io.yaml | 42 - ...inition_challenges.certmanager.k8s.io.yaml | 34 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 17 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 36 - ...tion_envoyfilters.networking.istio.io.yaml | 21 - ...finition_gateways.networking.istio.io.yaml | 23 - ...cedefinition_handlers.config.istio.io.yaml | 23 - ...n_httpapispecbindings.config.istio.io.yaml | 21 - ...finition_httpapispecs.config.istio.io.yaml | 21 - ...edefinition_instances.config.istio.io.yaml | 23 - ...definition_issuers.certmanager.k8s.io.yaml | 17 - ..._meshpolicies.authentication.istio.io.yaml | 22 - ...edefinition_orders.certmanager.k8s.io.yaml | 36 - ...tion_policies.authentication.istio.io.yaml | 21 - ...ion_quotaspecbindings.config.istio.io.yaml | 21 - ...definition_quotaspecs.config.istio.io.yaml | 21 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 23 - ...ourcedefinition_rules.config.istio.io.yaml | 23 - ...on_serviceentries.networking.istio.io.yaml | 45 - ...ion_servicerolebindings.rbac.istio.io.yaml | 35 - ...definition_serviceroles.rbac.istio.io.yaml | 23 - ...finition_sidecars.networking.istio.io.yaml | 21 - ...edefinition_templates.config.istio.io.yaml | 23 - ...n_virtualservices.networking.istio.io.yaml | 40 - .../apps_v1_daemonset_istio-nodeagent.yaml | 87 - .../apps_v1_deployment_istio-citadel.yaml | 78 - .../apps_v1_deployment_istio-galley.yaml | 122 - ...ps_v1_deployment_istio-ingressgateway.yaml | 202 - .../apps_v1_deployment_istio-pilot.yaml | 185 - .../apps_v1_deployment_istio-policy.yaml | 175 - ..._v1_deployment_istio-sidecar-injector.yaml | 117 - .../apps_v1_deployment_istio-telemetry.yaml | 185 - .../apps_v1_deployment_prometheus.yaml | 87 - ...talpodautoscaler_istio-ingressgateway.yaml | 20 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 19 - ..._horizontalpodautoscaler_istio-policy.yaml | 19 - ...rizontalpodautoscaler_istio-telemetry.yaml | 19 - ...post-install-release-1.3-latest-daily.yaml | 64 - ...v1alpha2_attributemanifest_istioproxy.yaml | 137 - ...v1alpha2_attributemanifest_kubernetes.yaml | 61 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 9 - ....istio.io_v1alpha2_handler_prometheus.yaml | 213 - ...istio.io_v1alpha2_instance_attributes.yaml | 36 - ...tio.io_v1alpha2_instance_requestcount.yaml | 36 - ....io_v1alpha2_instance_requestduration.yaml | 36 - ...stio.io_v1alpha2_instance_requestsize.yaml | 36 - ...tio.io_v1alpha2_instance_responsesize.yaml | 36 - ....io_v1alpha2_instance_tcpbytereceived.yaml | 32 - ...stio.io_v1alpha2_instance_tcpbytesent.yaml | 32 - ...1alpha2_instance_tcpconnectionsclosed.yaml | 32 - ...1alpha2_instance_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 12 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 18 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 14 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 13 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 13 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 13 - ...v1alpha3_destinationrule_istio-policy.yaml | 19 - ...lpha3_destinationrule_istio-telemetry.yaml | 19 - ...eta1_poddisruptionbudget_istio-galley.yaml | 14 - ...disruptionbudget_istio-ingressgateway.yaml | 14 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 14 - ...eta1_poddisruptionbudget_istio-policy.yaml | 17 - ...sruptionbudget_istio-sidecar-injector.yaml | 14 - ...1_poddisruptionbudget_istio-telemetry.yaml | 17 - ...lusterrole_istio-citadel-istio-system.yaml | 42 - ...clusterrole_istio-galley-istio-system.yaml | 90 - ..._clusterrole_istio-mixer-istio-system.yaml | 48 - ...sterrole_istio-nodeagent-istio-system.yaml | 13 - ..._clusterrole_istio-pilot-istio-system.yaml | 69 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 25 - ...1_clusterrole_prometheus-istio-system.yaml | 29 - ...olebinding_istio-citadel-istio-system.yaml | 14 - ...alley-admin-role-binding-istio-system.yaml | 14 - ...mixer-admin-role-binding-istio-system.yaml | 14 - ....io_v1_clusterrolebinding_istio-multi.yaml | 12 - ...ebinding_istio-nodeagent-istio-system.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 14 - ...ector-admin-role-binding-istio-system.yaml | 15 - ...errolebinding_prometheus-istio-system.yaml | 14 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 35 - ...ost-install-role-binding-istio-system.yaml | 14 - ...pha1_servicerole_istio-ingressgateway.yaml | 9 - ...rvicerolebinding_istio-ingressgateway.yaml | 11 - ..._configmap_istio-galley-configuration.yaml | 120 - .../~g_v1_configmap_istio-install-config.yaml | 7 - ...igmap_istio-security-custom-resources.yaml | 49 - ...g_v1_configmap_istio-sidecar-injector.yaml | 405 - .../expected/~g_v1_configmap_istio.yaml | 137 - .../expected/~g_v1_configmap_prometheus.yaml | 276 - .../~g_v1_namespace_istio-system.yaml | 4 - .../expected/~g_v1_service_istio-citadel.yaml | 18 - .../expected/~g_v1_service_istio-galley.yaml | 18 - .../~g_v1_service_istio-ingressgateway.yaml | 44 - .../expected/~g_v1_service_istio-pilot.yaml | 20 - .../expected/~g_v1_service_istio-policy.yaml | 21 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 23 - .../expected/~g_v1_service_prometheus.yaml | 16 - ...account_istio-citadel-service-account.yaml | 7 - ...eaccount_istio-galley-service-account.yaml | 7 - ..._istio-ingressgateway-service-account.yaml | 7 - ...ceaccount_istio-mixer-service-account.yaml | 7 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...count_istio-nodeagent-service-account.yaml | 7 - ...ceaccount_istio-pilot-service-account.yaml | 7 - ...t_istio-security-post-install-account.yaml | 7 - ...stio-sidecar-injector-service-account.yaml | 8 - .../~g_v1_serviceaccount_prometheus.yaml | 7 - .../application/istio-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 30 - ...cedefinition_adapters.config.istio.io.yaml | 24 - ...rcedefinition_apikeys.config.istio.io.yaml | 24 - ...on_attributemanifests.config.istio.io.yaml | 24 - ...nition_authorizations.config.istio.io.yaml | 24 - ...cedefinition_bypasses.config.istio.io.yaml | 24 - ...ition_certificates.certmanager.k8s.io.yaml | 43 - ...inition_challenges.certmanager.k8s.io.yaml | 35 - ...inition_checknothings.config.istio.io.yaml | 24 - ...definition_circonuses.config.istio.io.yaml | 24 - ...finition_cloudwatches.config.istio.io.yaml | 21 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 18 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 22 - ...rcedefinition_deniers.config.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 37 - ...definition_dogstatsds.config.istio.io.yaml | 21 - ...ourcedefinition_edges.config.istio.io.yaml | 24 - ...tion_envoyfilters.networking.istio.io.yaml | 22 - ...cedefinition_fluentds.config.istio.io.yaml | 24 - ...finition_gateways.networking.istio.io.yaml | 24 - ...cedefinition_handlers.config.istio.io.yaml | 24 - ...n_httpapispecbindings.config.istio.io.yaml | 22 - ...finition_httpapispecs.config.istio.io.yaml | 22 - ...edefinition_instances.config.istio.io.yaml | 24 - ...definition_issuers.certmanager.k8s.io.yaml | 18 - ...nition_kubernetesenvs.config.istio.io.yaml | 24 - ...finition_kuberneteses.config.istio.io.yaml | 24 - ...finition_listcheckers.config.istio.io.yaml | 24 - ...efinition_listentries.config.istio.io.yaml | 24 - ...definition_logentries.config.istio.io.yaml | 45 - ...edefinition_memquotas.config.istio.io.yaml | 24 - ..._meshpolicies.authentication.istio.io.yaml | 23 - ...rcedefinition_metrics.config.istio.io.yaml | 24 - ...ourcedefinition_noops.config.istio.io.yaml | 24 - ...sourcedefinition_opas.config.istio.io.yaml | 24 - ...edefinition_orders.certmanager.k8s.io.yaml | 37 - ...tion_policies.authentication.istio.io.yaml | 22 - ...finition_prometheuses.config.istio.io.yaml | 24 - ...urcedefinition_quotas.config.istio.io.yaml | 24 - ...ion_quotaspecbindings.config.istio.io.yaml | 22 - ...definition_quotaspecs.config.istio.io.yaml | 22 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 24 - ...ourcedefinition_rbacs.config.istio.io.yaml | 24 - ...efinition_redisquotas.config.istio.io.yaml | 21 - ...nition_reportnothings.config.istio.io.yaml | 24 - ...ourcedefinition_rules.config.istio.io.yaml | 24 - ...on_serviceentries.networking.istio.io.yaml | 46 - ...ion_servicerolebindings.rbac.istio.io.yaml | 36 - ...definition_serviceroles.rbac.istio.io.yaml | 24 - ...finition_sidecars.networking.istio.io.yaml | 22 - ...edefinition_signalfxs.config.istio.io.yaml | 24 - ...finition_solarwindses.config.istio.io.yaml | 24 - ...finition_stackdrivers.config.istio.io.yaml | 24 - ...rcedefinition_statsds.config.istio.io.yaml | 24 - ...urcedefinition_stdios.config.istio.io.yaml | 24 - ...edefinition_templates.config.istio.io.yaml | 24 - ...definition_tracespans.config.istio.io.yaml | 24 - ...n_virtualservices.networking.istio.io.yaml | 41 - ...rcedefinition_zipkins.config.istio.io.yaml | 21 - .../expected/apps_v1_deployment_grafana.yaml | 152 - .../apps_v1_deployment_istio-citadel.yaml | 90 - ...pps_v1_deployment_istio-egressgateway.yaml | 171 - .../apps_v1_deployment_istio-galley.yaml | 133 - ...ps_v1_deployment_istio-ingressgateway.yaml | 177 - .../apps_v1_deployment_istio-pilot.yaml | 175 - .../apps_v1_deployment_istio-policy.yaml | 168 - ..._v1_deployment_istio-sidecar-injector.yaml | 125 - .../apps_v1_deployment_istio-telemetry.yaml | 172 - .../apps_v1_deployment_istio-tracing.yaml | 99 - .../expected/apps_v1_deployment_kiali.yaml | 97 - .../apps_v1_deployment_prometheus.yaml | 93 - ...ntalpodautoscaler_istio-egressgateway.yaml | 22 - ...talpodautoscaler_istio-ingressgateway.yaml | 22 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 22 - ..._horizontalpodautoscaler_istio-policy.yaml | 22 - ...rizontalpodautoscaler_istio-telemetry.yaml | 22 - ...ch_v1_job_istio-cleanup-secrets-1.1.6.yaml | 72 - ..._job_istio-grafana-post-install-1.1.6.yaml | 72 - ...job_istio-security-post-install-1.1.6.yaml | 73 - ...v1alpha2_attributemanifest_istioproxy.yaml | 138 - ...v1alpha2_attributemanifest_kubernetes.yaml | 64 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 13 - ....istio.io_v1alpha2_handler_prometheus.yaml | 216 - ...onfig.istio.io_v1alpha2_handler_stdio.yaml | 14 - ...tio.io_v1alpha2_kubernetes_attributes.yaml | 37 - ....istio.io_v1alpha2_logentry_accesslog.yaml | 58 - ...tio.io_v1alpha2_logentry_tcpaccesslog.yaml | 43 - ...istio.io_v1alpha2_metric_requestcount.yaml | 36 - ...io.io_v1alpha2_metric_requestduration.yaml | 36 - ....istio.io_v1alpha2_metric_requestsize.yaml | 36 - ...istio.io_v1alpha2_metric_responsesize.yaml | 36 - ...io.io_v1alpha2_metric_tcpbytereceived.yaml | 32 - ....istio.io_v1alpha2_metric_tcpbytesent.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsclosed.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 15 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 20 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 17 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 16 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 16 - .../config.istio.io_v1alpha2_rule_stdio.yaml | 16 - ...onfig.istio.io_v1alpha2_rule_stdiotcp.yaml | 16 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 16 - ...v1alpha3_destinationrule_istio-policy.yaml | 17 - ...lpha3_destinationrule_istio-telemetry.yaml | 17 - ...ddisruptionbudget_istio-egressgateway.yaml | 18 - ...eta1_poddisruptionbudget_istio-galley.yaml | 18 - ...disruptionbudget_istio-ingressgateway.yaml | 18 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 18 - ...eta1_poddisruptionbudget_istio-policy.yaml | 21 - ...1_poddisruptionbudget_istio-telemetry.yaml | 21 - ...lusterrole_istio-citadel-istio-system.yaml | 44 - ...le_istio-cleanup-secrets-istio-system.yaml | 21 - ...role_istio-egressgateway-istio-system.yaml | 21 - ...clusterrole_istio-galley-istio-system.yaml | 85 - ...tio-grafana-post-install-istio-system.yaml | 16 - ...ole_istio-ingressgateway-istio-system.yaml | 21 - ..._clusterrole_istio-mixer-istio-system.yaml | 51 - ..._clusterrole_istio-pilot-istio-system.yaml | 73 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 28 - ...on.k8s.io_v1_clusterrole_kiali-viewer.yaml | 124 - ...orization.k8s.io_v1_clusterrole_kiali.yaml | 134 - ...1_clusterrole_prometheus-istio-system.yaml | 32 - ...olebinding_istio-citadel-istio-system.yaml | 17 - ...ng_istio-cleanup-secrets-istio-system.yaml | 21 - ...ding_istio-egressgateway-istio-system.yaml | 17 - ...alley-admin-role-binding-istio-system.yaml | 17 - ...ost-install-role-binding-istio-system.yaml | 17 - ...ing_istio-ingressgateway-istio-system.yaml | 17 - ...kiali-admin-role-binding-istio-system.yaml | 17 - ...mixer-admin-role-binding-istio-system.yaml | 17 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 17 - ...ector-admin-role-binding-istio-system.yaml | 18 - ...errolebinding_prometheus-istio-system.yaml | 17 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 38 - ...ost-install-role-binding-istio-system.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 123 - ...iguration-dashboards-galley-dashboard.yaml | 341 - ...ation-dashboards-istio-mesh-dashboard.yaml | 229 - ...ashboards-istio-performance-dashboard.yaml | 150 - ...on-dashboards-istio-service-dashboard.yaml | 795 -- ...n-dashboards-istio-workload-dashboard.yaml | 744 -- ...figuration-dashboards-mixer-dashboard.yaml | 359 - ...figuration-dashboards-pilot-dashboard.yaml | 307 - ...figmap_istio-grafana-custom-resources.yaml | 59 - .../~g_v1_configmap_istio-grafana.yaml | 34 - ...igmap_istio-security-custom-resources.yaml | 58 - ...g_v1_configmap_istio-sidecar-injector.yaml | 102 - .../expected/~g_v1_configmap_istio.yaml | 77 - .../expected/~g_v1_configmap_kiali.yaml | 14 - .../expected/~g_v1_configmap_prometheus.yaml | 313 - .../~g_v1_namespace_istio-system.yaml | 6 - .../expected/~g_v1_secret_kiali.yaml | 14 - .../expected/~g_v1_service_grafana.yaml | 19 - .../expected/~g_v1_service_istio-citadel.yaml | 21 - .../~g_v1_service_istio-egressgateway.yaml | 25 - .../expected/~g_v1_service_istio-galley.yaml | 21 - .../~g_v1_service_istio-ingressgateway.yaml | 48 - .../expected/~g_v1_service_istio-pilot.yaml | 23 - .../expected/~g_v1_service_istio-policy.yaml | 24 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 26 - .../expected/~g_v1_service_jaeger-agent.yaml | 28 - .../~g_v1_service_jaeger-collector.yaml | 24 - .../expected/~g_v1_service_jaeger-query.yaml | 19 - .../expected/~g_v1_service_kiali.yaml | 17 - .../expected/~g_v1_service_prometheus.yaml | 19 - .../expected/~g_v1_service_tracing.yaml | 19 - .../expected/~g_v1_service_zipkin.yaml | 19 - ...account_istio-citadel-service-account.yaml | 10 - ...istio-cleanup-secrets-service-account.yaml | 14 - ...t_istio-egressgateway-service-account.yaml | 10 - ...eaccount_istio-galley-service-account.yaml | 10 - ...nt_istio-grafana-post-install-account.yaml | 10 - ..._istio-ingressgateway-service-account.yaml | 10 - ...ceaccount_istio-mixer-service-account.yaml | 10 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...ceaccount_istio-pilot-service-account.yaml | 10 - ...t_istio-security-post-install-account.yaml | 10 - ...stio-sidecar-injector-service-account.yaml | 11 - ..._serviceaccount_kiali-service-account.yaml | 10 - .../~g_v1_serviceaccount_prometheus.yaml | 10 - .../ibm/application/istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - .../~g_v1_configmap_istio-config.yaml | 10 - .../jupyter-web-app/base/kustomize_test.go | 15 - ...deployment_jupyter-web-app-deployment.yaml | 63 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - ...count_jupyter-web-app-service-account.yaml | 10 - .../jupyter-web-app/kustomize_test.go | 15 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ...deployment_jupyter-web-app-deployment.yaml | 63 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - ...count_jupyter-web-app-service-account.yaml | 10 - .../ibm/application/katib/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 67 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - .../~g_v1_configmap_trial-template.yaml | 77 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - .../kfp-argo-multi-user/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 55 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...1_configmap_pipeline-minio-parameters.yaml | 11 - ...1_configmap_pipeline-mysql-parameters.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ..._persistentvolumeclaim_minio-pv-claim.yaml | 14 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../application/kfp-argo/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_metadata-writer.yaml | 32 - .../expected/apps_v1_deployment_minio.yaml | 55 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 103 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...1_configmap_pipeline-minio-parameters.yaml | 11 - ...1_configmap_pipeline-mysql-parameters.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ..._persistentvolumeclaim_minio-pv-claim.yaml | 14 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../kfp-tekton-multi-user/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-writer.yaml | 35 - .../expected/apps_v1_deployment_minio.yaml | 55 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 161 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 46 - ...ole_ml-pipeline-persistenceagent-role.yaml | 34 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 53 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 55 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 53 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - .../~g_v1_configmap_kfp-tekton-config.yaml | 31 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...es-profile-controller-code-gg2h6k2fch.yaml | 325 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...1_configmap_pipeline-minio-parameters.yaml | 11 - ...1_configmap_pipeline-mysql-parameters.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ..._persistentvolumeclaim_minio-pv-claim.yaml | 14 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../application/kfp-tekton/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_metadata-writer.yaml | 37 - .../expected/apps_v1_deployment_minio.yaml | 51 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 148 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 48 - ...ole_ml-pipeline-persistenceagent-role.yaml | 35 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 55 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 56 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 56 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 96 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ev_v1alpha1_condition_super-condition.yaml | 25 - .../~g_v1_configmap_kfp-tekton-config.yaml | 31 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 14 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 17 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../application/metadata/kustomize_test.go | 15 - ...p.k8s.io_v1beta1_application_metadata.yaml | 45 - .../apps_v1_deployment_metadata-db.yaml | 61 - ..._deployment_metadata-envoy-deployment.yaml | 36 - ...1_deployment_metadata-grpc-deployment.yaml | 50 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 26 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 15 - ...g_v1_configmap_metadata-db-parameters.yaml | 13 - ..._v1_configmap_metadata-grpc-configmap.yaml | 12 - ...g_v1_configmap_metadata-ui-parameters.yaml | 11 - ..._persistentvolumeclaim_metadata-mysql.yaml | 15 - .../~g_v1_secret_metadata-db-secrets.yaml | 13 - .../expected/~g_v1_service_metadata-db.yaml | 21 - .../~g_v1_service_metadata-envoy-service.yaml | 21 - .../~g_v1_service_metadata-grpc-service.yaml | 21 - .../base/kustomize_test.go | 15 - ...urcedefinition_notebooks.kubeflow.org.yaml | 96 - ...oyment_notebook-controller-deployment.yaml | 51 - ...k-controller-kubeflow-notebooks-admin.yaml | 15 - ...ok-controller-kubeflow-notebooks-edit.yaml | 26 - ...ok-controller-kubeflow-notebooks-view.yaml | 20 - ..._clusterrole_notebook-controller-role.yaml | 54 - ...ding_notebook-controller-role-binding.yaml | 17 - ..._configmap_notebook-controller-config.yaml | 13 - ...1_service_notebook-controller-service.yaml | 18 - ...t_notebook-controller-service-account.yaml | 10 - .../notebook-controller/kustomize_test.go | 15 - ...urcedefinition_notebooks.kubeflow.org.yaml | 96 - ...beta1_application_notebook-controller.yaml | 41 - ...oyment_notebook-controller-deployment.yaml | 51 - ..._configmap_notebook-controller-config.yaml | 13 - ...1_service_notebook-controller-service.yaml | 18 - ...t_notebook-controller-service-account.yaml | 10 - ...k-controller-kubeflow-notebooks-admin.yaml | 15 - ...ok-controller-kubeflow-notebooks-edit.yaml | 26 - ...ok-controller-kubeflow-notebooks-view.yaml | 20 - ..._clusterrole_notebook-controller-role.yaml | 54 - ...ding_notebook-controller-role-binding.yaml | 17 - .../application/notebooks/kustomize_test.go | 15 - ...urcedefinition_notebooks.kubeflow.org.yaml | 96 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ...beta1_application_notebook-controller.yaml | 42 - ...deployment_jupyter-web-app-deployment.yaml | 63 - ...oyment_notebook-controller-deployment.yaml | 51 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ...k-controller-kubeflow-notebooks-admin.yaml | 15 - ...ok-controller-kubeflow-notebooks-edit.yaml | 26 - ...ok-controller-kubeflow-notebooks-view.yaml | 20 - ..._clusterrole_notebook-controller-role.yaml | 54 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...ding_notebook-controller-role-binding.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ..._configmap_notebook-controller-config.yaml | 13 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - ...1_service_notebook-controller-service.yaml | 18 - ...count_jupyter-web-app-service-account.yaml | 10 - ...t_notebook-controller-service-account.yaml | 10 - .../oidc-authservice-appid/kustomize_test.go | 15 - .../apps_v1_statefulset_authservice.yaml | 83 - ....io_v1alpha3_envoyfilter_authn-filter.yaml | 36 - ...o_v1alpha3_virtualservice_authservice.yaml | 22 - ...configmap_oidc-authservice-parameters.yaml | 20 - ...persistentvolumeclaim_authservice-pvc.yaml | 14 - .../expected/~g_v1_service_authservice.yaml | 19 - ...ount_oidc-authservice-service-account.yaml | 8 - .../oidc-authservice/kustomize_test.go | 15 - ..._v1beta1_application_oidc-authservice.yaml | 44 - .../apps_v1_statefulset_authservice.yaml | 74 - ....io_v1alpha3_envoyfilter_authn-filter.yaml | 33 - ..._v1_configmap_oidc-authservice-config.yaml | 18 - ...persistentvolumeclaim_authservice-pvc.yaml | 11 - .../expected/~g_v1_service_authservice.yaml | 14 - .../profile-control-plane/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 160 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...p.k8s.io_v1beta1_application_profiles.yaml | 41 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...pps_v1_deployment_profiles-deployment.yaml | 103 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...istio.io_v1alpha3_virtualservice_kfam.yaml | 28 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ...binding_profiles-cluster-role-binding.yaml | 16 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - ...p_profiles-profiles-config-h7dck95hm2.yaml | 13 - .../~g_v1_service_centraldashboard.yaml | 31 - .../expected/~g_v1_service_profiles-kfam.yaml | 16 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...t_profiles-controller-service-account.yaml | 9 - .../profiles/base/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...pps_v1_deployment_profiles-deployment.yaml | 96 - ...binding_profiles-cluster-role-binding.yaml | 13 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 9 - .../expected/~g_v1_service_profiles-kfam.yaml | 11 - ...t_profiles-controller-service-account.yaml | 6 - .../application/profiles/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 160 - ...p.k8s.io_v1beta1_application_profiles.yaml | 40 - ...pps_v1_deployment_profiles-deployment.yaml | 102 - ...istio.io_v1alpha3_virtualservice_kfam.yaml | 27 - ...binding_profiles-cluster-role-binding.yaml | 15 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 11 - .../expected/~g_v1_service_profiles-kfam.yaml | 15 - ...t_profiles-controller-service-account.yaml | 8 - .../application/pytorch-job/kustomize_test.go | 15 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - .../~g_v1_service_pytorch-operator.yaml | 25 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../seldon-core-operator/kustomize_test.go | 15 - ...tating-webhook-configuration-kubeflow.yaml | 86 - ...dating-webhook-configuration-kubeflow.yaml | 86 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...eta1_application_seldon-core-operator.yaml | 46 - ..._deployment_seldon-controller-manager.yaml | 180 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_service_seldon-webhook-service.yaml | 22 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - .../spark-operator/kustomize_test.go | 15 - ...parkapplications.sparkoperator.k8s.io.yaml | 2550 ------ ...parkapplications.sparkoperator.k8s.io.yaml | 2532 ------ ...io_v1beta1_application_spark-operator.yaml | 42 - ...eployment_spark-operatorsparkoperator.yaml | 51 - ...clusterrole_spark-operatoroperator-cr.yaml | 76 - ...nding_spark-operatorsparkoperator-crb.yaml | 16 - ...s.io_v1_role_spark-operatorspark-role.yaml | 23 - ...ding_spark-operatorspark-role-binding.yaml | 17 - ...viceaccount_spark-operatoroperator-sa.yaml | 9 - ...v1_serviceaccount_spark-operatorspark.yaml | 9 - .../application/spartakus/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_spartakus.yaml | 37 - ...pps_v1_deployment_spartakus-volunteer.yaml | 41 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 17 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 17 - .../~g_v1_configmap_spartakus-config.yaml | 12 - .../~g_v1_serviceaccount_spartakus.yaml | 10 - .../ibm/application/tf-job/kustomize_test.go | 15 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 11 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - tests/stacks/ibm/base/kustomize_test.go | 15 - ..._configmap_kubeflow-config-d7dttg89h2.yaml | 9 - tests/stacks/ibm/kustomize_test.go | 15 - tests/stacks/ibm/multi-user/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...tating-webhook-configuration-kubeflow.yaml | 86 - ...dating-webhook-configuration-kubeflow.yaml | 86 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...urcedefinition_notebooks.kubeflow.org.yaml | 96 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 160 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - ...p.k8s.io_v1beta1_application_metadata.yaml | 45 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...beta1_application_notebook-controller.yaml | 42 - ...p.k8s.io_v1beta1_application_profiles.yaml | 41 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...eta1_application_seldon-core-operator.yaml | 46 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 63 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 67 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-db.yaml | 61 - ..._deployment_metadata-envoy-deployment.yaml | 36 - ...1_deployment_metadata-grpc-deployment.yaml | 50 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 55 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 51 - ...pps_v1_deployment_profiles-deployment.yaml | 103 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ..._deployment_seldon-controller-manager.yaml | 180 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...istio.io_v1alpha3_virtualservice_kfam.yaml | 28 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 26 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...k-controller-kubeflow-notebooks-admin.yaml | 15 - ...ok-controller-kubeflow-notebooks-edit.yaml | 26 - ...ok-controller-kubeflow-notebooks-view.yaml | 20 - ..._clusterrole_notebook-controller-role.yaml | 54 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...ding_notebook-controller-role-binding.yaml | 17 - ...binding_profiles-cluster-role-binding.yaml | 16 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 15 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 13 - ..._v1_configmap_metadata-grpc-configmap.yaml | 12 - ...g_v1_configmap_metadata-ui-parameters.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ..._configmap_notebook-controller-config.yaml | 13 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...1_configmap_pipeline-minio-parameters.yaml | 11 - ...1_configmap_pipeline-mysql-parameters.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-h7dck95hm2.yaml | 13 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 23 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 15 - ..._persistentvolumeclaim_minio-pv-claim.yaml | 14 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_secret_metadata-db-secrets.yaml | 13 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 21 - .../~g_v1_service_metadata-envoy-service.yaml | 21 - .../~g_v1_service_metadata-grpc-service.yaml | 21 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 18 - .../expected/~g_v1_service_profiles-kfam.yaml | 16 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_seldon-webhook-service.yaml | 22 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 10 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - ...t_notebook-controller-service-account.yaml | 10 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 9 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...tating-webhook-configuration-kubeflow.yaml | 86 - ...dating-webhook-configuration-kubeflow.yaml | 86 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...urcedefinition_notebooks.kubeflow.org.yaml | 96 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 160 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...o_v1beta1_application_jupyter-web-app.yaml | 49 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - ...p.k8s.io_v1beta1_application_metadata.yaml | 45 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...beta1_application_notebook-controller.yaml | 42 - ...p.k8s.io_v1beta1_application_profiles.yaml | 41 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...eta1_application_seldon-core-operator.yaml | 46 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 63 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 67 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - .../apps_v1_deployment_metadata-db.yaml | 61 - ..._deployment_metadata-envoy-deployment.yaml | 36 - ...1_deployment_metadata-grpc-deployment.yaml | 50 - .../apps_v1_deployment_metadata-writer.yaml | 32 - .../expected/apps_v1_deployment_minio.yaml | 55 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 103 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 51 - ...pps_v1_deployment_profiles-deployment.yaml | 103 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ..._deployment_seldon-controller-manager.yaml | 180 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...alpha3_virtualservice_jupyter-web-app.yaml | 25 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...istio.io_v1alpha3_virtualservice_kfam.yaml | 28 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 26 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 59 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 11 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 22 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 28 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...k-controller-kubeflow-notebooks-admin.yaml | 15 - ...ok-controller-kubeflow-notebooks-edit.yaml | 26 - ...ok-controller-kubeflow-notebooks-view.yaml | 20 - ..._clusterrole_notebook-controller-role.yaml | 54 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ding_notebook-controller-role-binding.yaml | 17 - ...binding_profiles-cluster-role-binding.yaml | 16 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 41 - ...web-app-jupyter-notebook-role-binding.yaml | 17 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...upyter-web-app-jupyter-web-app-config.yaml | 198 - ..._configmap_jupyter-web-app-parameters.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-bk4bc7m928.yaml | 15 - ...g_v1_configmap_metadata-db-parameters.yaml | 13 - ..._v1_configmap_metadata-grpc-configmap.yaml | 12 - ...g_v1_configmap_metadata-ui-parameters.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ..._configmap_notebook-controller-config.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...1_configmap_pipeline-minio-parameters.yaml | 11 - ...1_configmap_pipeline-mysql-parameters.yaml | 12 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-h7dck95hm2.yaml | 13 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 23 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 15 - ..._persistentvolumeclaim_minio-pv-claim.yaml | 14 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_secret_metadata-db-secrets.yaml | 13 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 33 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - .../expected/~g_v1_service_metadata-db.yaml | 21 - .../~g_v1_service_metadata-envoy-service.yaml | 21 - .../~g_v1_service_metadata-grpc-service.yaml | 21 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 18 - .../expected/~g_v1_service_profiles-kfam.yaml | 16 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_seldon-webhook-service.yaml | 22 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 10 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - ...t_notebook-controller-service-account.yaml | 10 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 9 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - .../kustomize_test.go | 15 - ..._v1alpha3_envoyfilter_add-user-filter.yaml | 20 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 9 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 35 - ...ookconfiguration_cert-manager-webhook.yaml | 34 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 19 - ...s.io_v1beta1_application_cert-manager.yaml | 41 - ...v1_deployment_cert-manager-cainjector.yaml | 41 - ...ps_v1_deployment_cert-manager-webhook.yaml | 50 - .../apps_v1_deployment_cert-manager.yaml | 54 - ...erissuer_kubeflow-self-signing-issuer.yaml | 11 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 24 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 23 - ...ert-manager-webhook:webhook-requester.yaml | 19 - ...1_clusterrole_cert-manager-cainjector.yaml | 63 - ..._cert-manager-controller-certificates.yaml | 64 - ...le_cert-manager-controller-challenges.yaml | 86 - ...ert-manager-controller-clusterissuers.yaml | 43 - ..._cert-manager-controller-ingress-shim.yaml | 51 - ...rrole_cert-manager-controller-issuers.yaml | 43 - ...errole_cert-manager-controller-orders.yaml | 63 - ...errolebinding_cert-manager-cainjector.yaml | 17 - ..._cert-manager-controller-certificates.yaml | 17 - ...ng_cert-manager-controller-challenges.yaml | 17 - ...ert-manager-controller-clusterissuers.yaml | 17 - ..._cert-manager-controller-ingress-shim.yaml | 17 - ...nding_cert-manager-controller-issuers.yaml | 17 - ...inding_cert-manager-controller-orders.yaml | 17 - ...g_cert-manager-webhook:auth-delegator.yaml | 18 - ..._v1_configmap_cert-manager-parameters.yaml | 11 - .../~g_v1_namespace_cert-manager.yaml | 8 - .../~g_v1_service_cert-manager-webhook.yaml | 21 - .../expected/~g_v1_service_cert-manager.yaml | 21 - ...erviceaccount_cert-manager-cainjector.yaml | 10 - ...1_serviceaccount_cert-manager-webhook.yaml | 10 - .../~g_v1_serviceaccount_cert-manager.yaml | 10 - .../kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 185 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...r-local-gateway-parameters-tbbdb2842d.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../cluster-local-gateway/kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 164 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...le_cluster-local-gateway-istio-system.yaml | 19 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ...ng_cluster-local-gateway-istio-system.yaml | 15 - ...r-local-gateway-parameters-tbbdb2842d.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../application/dex-auth/kustomize_test.go | 15 - ...cedefinition_authcodes.dex.coreos.com.yaml | 13 - .../expected/apps_v1_deployment_dex.yaml | 38 - ....istio.io_v1alpha3_virtualservice_dex.yaml | 19 - ...zation.k8s.io_v1beta1_clusterrole_dex.yaml | 17 - ...k8s.io_v1beta1_clusterrolebinding_dex.yaml | 12 - .../expected/~g_v1_configmap_dex-config.yaml | 8 - .../~g_v1_configmap_dex-parameters.yaml | 18 - .../expected/~g_v1_configmap_dex.yaml | 30 - .../expected/~g_v1_namespace_auth.yaml | 4 - .../test_data/expected/~g_v1_service_dex.yaml | 15 - .../expected/~g_v1_serviceaccount_dex.yaml | 5 - .../istio-1-3-1-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 27 - ...cedefinition_adapters.config.istio.io.yaml | 23 - ...on_attributemanifests.config.istio.io.yaml | 23 - ...n_authorizationpolicies.rbac.istio.io.yaml | 22 - ...ition_certificates.certmanager.k8s.io.yaml | 42 - ...inition_challenges.certmanager.k8s.io.yaml | 34 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 17 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 36 - ...tion_envoyfilters.networking.istio.io.yaml | 21 - ...finition_gateways.networking.istio.io.yaml | 23 - ...cedefinition_handlers.config.istio.io.yaml | 23 - ...n_httpapispecbindings.config.istio.io.yaml | 21 - ...finition_httpapispecs.config.istio.io.yaml | 21 - ...edefinition_instances.config.istio.io.yaml | 23 - ...definition_issuers.certmanager.k8s.io.yaml | 17 - ..._meshpolicies.authentication.istio.io.yaml | 22 - ...edefinition_orders.certmanager.k8s.io.yaml | 36 - ...tion_policies.authentication.istio.io.yaml | 21 - ...ion_quotaspecbindings.config.istio.io.yaml | 21 - ...definition_quotaspecs.config.istio.io.yaml | 21 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 23 - ...ourcedefinition_rules.config.istio.io.yaml | 23 - ...on_serviceentries.networking.istio.io.yaml | 45 - ...ion_servicerolebindings.rbac.istio.io.yaml | 35 - ...definition_serviceroles.rbac.istio.io.yaml | 23 - ...finition_sidecars.networking.istio.io.yaml | 21 - ...edefinition_templates.config.istio.io.yaml | 23 - ...n_virtualservices.networking.istio.io.yaml | 40 - .../apps_v1_daemonset_istio-nodeagent.yaml | 87 - .../apps_v1_deployment_istio-citadel.yaml | 78 - .../apps_v1_deployment_istio-galley.yaml | 122 - ...ps_v1_deployment_istio-ingressgateway.yaml | 202 - .../apps_v1_deployment_istio-pilot.yaml | 185 - .../apps_v1_deployment_istio-policy.yaml | 175 - ..._v1_deployment_istio-sidecar-injector.yaml | 117 - .../apps_v1_deployment_istio-telemetry.yaml | 185 - .../apps_v1_deployment_prometheus.yaml | 87 - ...talpodautoscaler_istio-ingressgateway.yaml | 20 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 19 - ..._horizontalpodautoscaler_istio-policy.yaml | 19 - ...rizontalpodautoscaler_istio-telemetry.yaml | 19 - ...post-install-release-1.3-latest-daily.yaml | 64 - ...v1alpha2_attributemanifest_istioproxy.yaml | 137 - ...v1alpha2_attributemanifest_kubernetes.yaml | 61 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 9 - ....istio.io_v1alpha2_handler_prometheus.yaml | 213 - ...istio.io_v1alpha2_instance_attributes.yaml | 36 - ...tio.io_v1alpha2_instance_requestcount.yaml | 36 - ....io_v1alpha2_instance_requestduration.yaml | 36 - ...stio.io_v1alpha2_instance_requestsize.yaml | 36 - ...tio.io_v1alpha2_instance_responsesize.yaml | 36 - ....io_v1alpha2_instance_tcpbytereceived.yaml | 32 - ...stio.io_v1alpha2_instance_tcpbytesent.yaml | 32 - ...1alpha2_instance_tcpconnectionsclosed.yaml | 32 - ...1alpha2_instance_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 12 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 18 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 14 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 13 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 13 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 13 - ...v1alpha3_destinationrule_istio-policy.yaml | 19 - ...lpha3_destinationrule_istio-telemetry.yaml | 19 - ...eta1_poddisruptionbudget_istio-galley.yaml | 14 - ...disruptionbudget_istio-ingressgateway.yaml | 14 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 14 - ...eta1_poddisruptionbudget_istio-policy.yaml | 17 - ...sruptionbudget_istio-sidecar-injector.yaml | 14 - ...1_poddisruptionbudget_istio-telemetry.yaml | 17 - ...lusterrole_istio-citadel-istio-system.yaml | 42 - ...clusterrole_istio-galley-istio-system.yaml | 90 - ..._clusterrole_istio-mixer-istio-system.yaml | 48 - ...sterrole_istio-nodeagent-istio-system.yaml | 13 - ..._clusterrole_istio-pilot-istio-system.yaml | 69 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 25 - ...1_clusterrole_prometheus-istio-system.yaml | 29 - ...olebinding_istio-citadel-istio-system.yaml | 14 - ...alley-admin-role-binding-istio-system.yaml | 14 - ...mixer-admin-role-binding-istio-system.yaml | 14 - ....io_v1_clusterrolebinding_istio-multi.yaml | 12 - ...ebinding_istio-nodeagent-istio-system.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 14 - ...ector-admin-role-binding-istio-system.yaml | 15 - ...errolebinding_prometheus-istio-system.yaml | 14 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 35 - ...ost-install-role-binding-istio-system.yaml | 14 - ...pha1_servicerole_istio-ingressgateway.yaml | 9 - ...rvicerolebinding_istio-ingressgateway.yaml | 11 - ..._configmap_istio-galley-configuration.yaml | 120 - ...p_istio-install-parameters-5kmkd2f29g.yaml | 7 - ...igmap_istio-security-custom-resources.yaml | 49 - ...g_v1_configmap_istio-sidecar-injector.yaml | 405 - .../expected/~g_v1_configmap_istio.yaml | 137 - .../expected/~g_v1_configmap_prometheus.yaml | 276 - .../~g_v1_namespace_istio-system.yaml | 4 - .../expected/~g_v1_service_istio-citadel.yaml | 18 - .../expected/~g_v1_service_istio-galley.yaml | 18 - .../~g_v1_service_istio-ingressgateway.yaml | 44 - .../expected/~g_v1_service_istio-pilot.yaml | 20 - .../expected/~g_v1_service_istio-policy.yaml | 21 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 23 - .../expected/~g_v1_service_prometheus.yaml | 16 - ...account_istio-citadel-service-account.yaml | 7 - ...eaccount_istio-galley-service-account.yaml | 7 - ..._istio-ingressgateway-service-account.yaml | 7 - ...ceaccount_istio-mixer-service-account.yaml | 7 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...count_istio-nodeagent-service-account.yaml | 7 - ...ceaccount_istio-pilot-service-account.yaml | 7 - ...t_istio-security-post-install-account.yaml | 7 - ...stio-sidecar-injector-service-account.yaml | 8 - .../~g_v1_serviceaccount_prometheus.yaml | 7 - .../application/istio-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 30 - ...cedefinition_adapters.config.istio.io.yaml | 24 - ...rcedefinition_apikeys.config.istio.io.yaml | 24 - ...on_attributemanifests.config.istio.io.yaml | 24 - ...nition_authorizations.config.istio.io.yaml | 24 - ...cedefinition_bypasses.config.istio.io.yaml | 24 - ...ition_certificates.certmanager.k8s.io.yaml | 43 - ...inition_challenges.certmanager.k8s.io.yaml | 35 - ...inition_checknothings.config.istio.io.yaml | 24 - ...definition_circonuses.config.istio.io.yaml | 24 - ...finition_cloudwatches.config.istio.io.yaml | 21 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 18 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 22 - ...rcedefinition_deniers.config.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 37 - ...definition_dogstatsds.config.istio.io.yaml | 21 - ...ourcedefinition_edges.config.istio.io.yaml | 24 - ...tion_envoyfilters.networking.istio.io.yaml | 22 - ...cedefinition_fluentds.config.istio.io.yaml | 24 - ...finition_gateways.networking.istio.io.yaml | 24 - ...cedefinition_handlers.config.istio.io.yaml | 24 - ...n_httpapispecbindings.config.istio.io.yaml | 22 - ...finition_httpapispecs.config.istio.io.yaml | 22 - ...edefinition_instances.config.istio.io.yaml | 24 - ...definition_issuers.certmanager.k8s.io.yaml | 18 - ...nition_kubernetesenvs.config.istio.io.yaml | 24 - ...finition_kuberneteses.config.istio.io.yaml | 24 - ...finition_listcheckers.config.istio.io.yaml | 24 - ...efinition_listentries.config.istio.io.yaml | 24 - ...definition_logentries.config.istio.io.yaml | 45 - ...edefinition_memquotas.config.istio.io.yaml | 24 - ..._meshpolicies.authentication.istio.io.yaml | 23 - ...rcedefinition_metrics.config.istio.io.yaml | 24 - ...ourcedefinition_noops.config.istio.io.yaml | 24 - ...sourcedefinition_opas.config.istio.io.yaml | 24 - ...edefinition_orders.certmanager.k8s.io.yaml | 37 - ...tion_policies.authentication.istio.io.yaml | 22 - ...finition_prometheuses.config.istio.io.yaml | 24 - ...urcedefinition_quotas.config.istio.io.yaml | 24 - ...ion_quotaspecbindings.config.istio.io.yaml | 22 - ...definition_quotaspecs.config.istio.io.yaml | 22 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 24 - ...ourcedefinition_rbacs.config.istio.io.yaml | 24 - ...efinition_redisquotas.config.istio.io.yaml | 21 - ...nition_reportnothings.config.istio.io.yaml | 24 - ...ourcedefinition_rules.config.istio.io.yaml | 24 - ...on_serviceentries.networking.istio.io.yaml | 46 - ...ion_servicerolebindings.rbac.istio.io.yaml | 36 - ...definition_serviceroles.rbac.istio.io.yaml | 24 - ...finition_sidecars.networking.istio.io.yaml | 22 - ...edefinition_signalfxs.config.istio.io.yaml | 24 - ...finition_solarwindses.config.istio.io.yaml | 24 - ...finition_stackdrivers.config.istio.io.yaml | 24 - ...rcedefinition_statsds.config.istio.io.yaml | 24 - ...urcedefinition_stdios.config.istio.io.yaml | 24 - ...edefinition_templates.config.istio.io.yaml | 24 - ...definition_tracespans.config.istio.io.yaml | 24 - ...n_virtualservices.networking.istio.io.yaml | 41 - ...rcedefinition_zipkins.config.istio.io.yaml | 21 - .../expected/apps_v1_deployment_grafana.yaml | 152 - .../apps_v1_deployment_istio-citadel.yaml | 90 - ...pps_v1_deployment_istio-egressgateway.yaml | 171 - .../apps_v1_deployment_istio-galley.yaml | 133 - ...ps_v1_deployment_istio-ingressgateway.yaml | 177 - .../apps_v1_deployment_istio-pilot.yaml | 175 - .../apps_v1_deployment_istio-policy.yaml | 168 - ..._v1_deployment_istio-sidecar-injector.yaml | 125 - .../apps_v1_deployment_istio-telemetry.yaml | 172 - .../apps_v1_deployment_istio-tracing.yaml | 99 - .../expected/apps_v1_deployment_kiali.yaml | 97 - .../apps_v1_deployment_prometheus.yaml | 93 - ...ntalpodautoscaler_istio-egressgateway.yaml | 22 - ...talpodautoscaler_istio-ingressgateway.yaml | 22 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 22 - ..._horizontalpodautoscaler_istio-policy.yaml | 22 - ...rizontalpodautoscaler_istio-telemetry.yaml | 22 - ...ch_v1_job_istio-cleanup-secrets-1.1.6.yaml | 72 - ..._job_istio-grafana-post-install-1.1.6.yaml | 72 - ...job_istio-security-post-install-1.1.6.yaml | 73 - ...v1alpha2_attributemanifest_istioproxy.yaml | 138 - ...v1alpha2_attributemanifest_kubernetes.yaml | 64 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 13 - ....istio.io_v1alpha2_handler_prometheus.yaml | 216 - ...onfig.istio.io_v1alpha2_handler_stdio.yaml | 14 - ...tio.io_v1alpha2_kubernetes_attributes.yaml | 37 - ....istio.io_v1alpha2_logentry_accesslog.yaml | 58 - ...tio.io_v1alpha2_logentry_tcpaccesslog.yaml | 43 - ...istio.io_v1alpha2_metric_requestcount.yaml | 36 - ...io.io_v1alpha2_metric_requestduration.yaml | 36 - ....istio.io_v1alpha2_metric_requestsize.yaml | 36 - ...istio.io_v1alpha2_metric_responsesize.yaml | 36 - ...io.io_v1alpha2_metric_tcpbytereceived.yaml | 32 - ....istio.io_v1alpha2_metric_tcpbytesent.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsclosed.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 15 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 20 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 17 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 16 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 16 - .../config.istio.io_v1alpha2_rule_stdio.yaml | 16 - ...onfig.istio.io_v1alpha2_rule_stdiotcp.yaml | 16 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 16 - ...v1alpha3_destinationrule_istio-policy.yaml | 17 - ...lpha3_destinationrule_istio-telemetry.yaml | 17 - ...ddisruptionbudget_istio-egressgateway.yaml | 18 - ...eta1_poddisruptionbudget_istio-galley.yaml | 18 - ...disruptionbudget_istio-ingressgateway.yaml | 18 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 18 - ...eta1_poddisruptionbudget_istio-policy.yaml | 21 - ...1_poddisruptionbudget_istio-telemetry.yaml | 21 - ...lusterrole_istio-citadel-istio-system.yaml | 44 - ...le_istio-cleanup-secrets-istio-system.yaml | 21 - ...role_istio-egressgateway-istio-system.yaml | 21 - ...clusterrole_istio-galley-istio-system.yaml | 85 - ...tio-grafana-post-install-istio-system.yaml | 16 - ...ole_istio-ingressgateway-istio-system.yaml | 21 - ..._clusterrole_istio-mixer-istio-system.yaml | 51 - ..._clusterrole_istio-pilot-istio-system.yaml | 73 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 28 - ...on.k8s.io_v1_clusterrole_kiali-viewer.yaml | 124 - ...orization.k8s.io_v1_clusterrole_kiali.yaml | 134 - ...1_clusterrole_prometheus-istio-system.yaml | 32 - ...olebinding_istio-citadel-istio-system.yaml | 17 - ...ng_istio-cleanup-secrets-istio-system.yaml | 21 - ...ding_istio-egressgateway-istio-system.yaml | 17 - ...alley-admin-role-binding-istio-system.yaml | 17 - ...ost-install-role-binding-istio-system.yaml | 17 - ...ing_istio-ingressgateway-istio-system.yaml | 17 - ...kiali-admin-role-binding-istio-system.yaml | 17 - ...mixer-admin-role-binding-istio-system.yaml | 17 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 17 - ...ector-admin-role-binding-istio-system.yaml | 18 - ...errolebinding_prometheus-istio-system.yaml | 17 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 38 - ...ost-install-role-binding-istio-system.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 123 - ...iguration-dashboards-galley-dashboard.yaml | 341 - ...ation-dashboards-istio-mesh-dashboard.yaml | 229 - ...ashboards-istio-performance-dashboard.yaml | 150 - ...on-dashboards-istio-service-dashboard.yaml | 795 -- ...n-dashboards-istio-workload-dashboard.yaml | 744 -- ...figuration-dashboards-mixer-dashboard.yaml | 359 - ...figuration-dashboards-pilot-dashboard.yaml | 307 - ...figmap_istio-grafana-custom-resources.yaml | 59 - .../~g_v1_configmap_istio-grafana.yaml | 34 - ...igmap_istio-security-custom-resources.yaml | 58 - ...g_v1_configmap_istio-sidecar-injector.yaml | 102 - .../expected/~g_v1_configmap_istio.yaml | 77 - .../expected/~g_v1_configmap_kiali.yaml | 14 - .../expected/~g_v1_configmap_prometheus.yaml | 313 - .../~g_v1_namespace_istio-system.yaml | 6 - .../expected/~g_v1_secret_kiali.yaml | 14 - .../expected/~g_v1_service_grafana.yaml | 19 - .../expected/~g_v1_service_istio-citadel.yaml | 21 - .../~g_v1_service_istio-egressgateway.yaml | 25 - .../expected/~g_v1_service_istio-galley.yaml | 21 - .../~g_v1_service_istio-ingressgateway.yaml | 48 - .../expected/~g_v1_service_istio-pilot.yaml | 23 - .../expected/~g_v1_service_istio-policy.yaml | 24 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 26 - .../expected/~g_v1_service_jaeger-agent.yaml | 28 - .../~g_v1_service_jaeger-collector.yaml | 24 - .../expected/~g_v1_service_jaeger-query.yaml | 19 - .../expected/~g_v1_service_kiali.yaml | 17 - .../expected/~g_v1_service_prometheus.yaml | 19 - .../expected/~g_v1_service_tracing.yaml | 19 - .../expected/~g_v1_service_zipkin.yaml | 19 - ...account_istio-citadel-service-account.yaml | 10 - ...istio-cleanup-secrets-service-account.yaml | 14 - ...t_istio-egressgateway-service-account.yaml | 10 - ...eaccount_istio-galley-service-account.yaml | 10 - ...nt_istio-grafana-post-install-account.yaml | 10 - ..._istio-ingressgateway-service-account.yaml | 10 - ...ceaccount_istio-mixer-service-account.yaml | 10 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...ceaccount_istio-pilot-service-account.yaml | 10 - ...t_istio-security-post-install-account.yaml | 10 - ...stio-sidecar-injector-service-account.yaml | 11 - ..._serviceaccount_kiali-service-account.yaml | 10 - .../~g_v1_serviceaccount_prometheus.yaml | 10 - .../application/istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - ...configmap_istio-parameters-797cg68672.yaml | 10 - .../oidc-authservice/kustomize_test.go | 15 - ..._v1beta1_application_oidc-authservice.yaml | 47 - .../apps_v1_statefulset_authservice.yaml | 70 - ....io_v1alpha3_envoyfilter_authn-filter.yaml | 36 - ...configmap_oidc-authservice-parameters.yaml | 20 - ...persistentvolumeclaim_authservice-pvc.yaml | 14 - .../expected/~g_v1_service_authservice.yaml | 19 - .../spark-operator/kustomize_test.go | 15 - ...parkapplications.sparkoperator.k8s.io.yaml | 2550 ------ ...parkapplications.sparkoperator.k8s.io.yaml | 2532 ------ ...io_v1beta1_application_spark-operator.yaml | 42 - ...eployment_spark-operatorsparkoperator.yaml | 51 - ...clusterrole_spark-operatoroperator-cr.yaml | 76 - ...nding_spark-operatorsparkoperator-crb.yaml | 16 - ...s.io_v1_role_spark-operatorspark-role.yaml | 23 - ...ding_spark-operatorspark-role-binding.yaml | 17 - ...viceaccount_spark-operatoroperator-sa.yaml | 9 - ...v1_serviceaccount_spark-operatorspark.yaml | 9 - .../application/spartakus/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_spartakus.yaml | 37 - ...pps_v1_deployment_spartakus-volunteer.yaml | 41 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 17 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 17 - .../~g_v1_configmap_spartakus-config.yaml | 12 - .../~g_v1_serviceaccount_spartakus.yaml | 10 - tests/stacks/kubernetes/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 31 - ...tating-webhook-configuration-kubeflow.yaml | 86 - ...dating-webhook-configuration-kubeflow.yaml | 86 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...sourcedefinition_mpijobs.kubeflow.org.yaml | 156 - ...esourcedefinition_mxjobs.kubeflow.org.yaml | 58 - ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...cedefinition_poddefaults.kubeflow.org.yaml | 56 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - ...1beta1_application_kubeflow-pipelines.yaml | 52 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - ...s.io_v1beta1_application_mpi-operator.yaml | 48 - ...io_v1beta1_application_mxnet-operator.yaml | 51 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ...tebook-controller-notebook-controller.yaml | 42 - ...v1beta1_application_profiles-profiles.yaml | 40 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - ...eta1_application_seldon-core-operator.yaml | 46 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 41 - ...ployment_admission-webhook-deployment.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 77 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...deployment_jupyter-web-app-deployment.yaml | 46 - .../apps_v1_deployment_katib-controller.yaml | 61 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 76 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...kubeflow-pipelines-profile-controller.yaml | 59 - .../apps_v1_deployment_metadata-db.yaml | 55 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - .../apps_v1_deployment_metadata-writer.yaml | 30 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 32 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 30 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 100 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 37 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 116 - .../apps_v1_deployment_mpi-operator.yaml | 38 - .../apps_v1_deployment_mxnet-operator.yaml | 42 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...oyment_notebook-controller-deployment.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ..._deployment_seldon-controller-manager.yaml | 180 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...a2_certificate_admission-webhook-cert.yaml | 18 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...kubeflow-pipelines-profile-controller.yaml | 44 - ...ha3_destinationrule_ml-pipeline-mysql.yaml | 13 - ...alpha3_destinationrule_ml-pipeline-ui.yaml | 13 - ...nrule_ml-pipeline-visualizationserver.yaml | 13 - ..._v1alpha3_destinationrule_ml-pipeline.yaml | 13 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...errole_admission-webhook-cluster-role.yaml | 22 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 15 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 21 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...v1_clusterrole_kubeflow-mpijobs-admin.yaml | 14 - ..._v1_clusterrole_kubeflow-mpijobs-edit.yaml | 25 - ..._v1_clusterrole_kubeflow-mpijobs-view.yaml | 19 - ..._v1_clusterrole_kubeflow-mxjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-mxjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-mxjobs-view.yaml | 19 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...terrole_kubeflow-pipelines-cache-role.yaml | 34 - ...beflow-pipelines-metadata-writer-role.yaml | 34 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - ...ole_ml-pipeline-persistenceagent-role.yaml | 24 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 39 - ....k8s.io_v1_clusterrole_ml-pipeline-ui.yaml | 46 - ...le_ml-pipeline-viewer-controller-role.yaml | 33 - ...on.k8s.io_v1_clusterrole_mpi-operator.yaml | 107 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...dmission-webhook-cluster-role-binding.yaml | 17 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - ...ding_kubeflow-pipelines-cache-binding.yaml | 15 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...low-pipelines-metadata-writer-binding.yaml | 15 - ..._ml-pipeline-persistenceagent-binding.yaml | 15 - ...ml-pipeline-scheduledworkflow-binding.yaml | 15 - ..._v1_clusterrolebinding_ml-pipeline-ui.yaml | 16 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 15 - ...io_v1_clusterrolebinding_mpi-operator.yaml | 17 - ...ding_notebook-controller-role-binding.yaml | 15 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...8s.io_v1beta1_clusterrole_ml-pipeline.yaml | 37 - ...io_v1beta1_clusterrole_mxnet-operator.yaml | 52 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ...1beta1_clusterrolebinding_ml-pipeline.yaml | 15 - ...ta1_clusterrolebinding_mxnet-operator.yaml | 17 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...horizationpolicy_ml-pipeline-internal.yaml | 30 - ...a1_authorizationpolicy_ml-pipeline-ui.yaml | 19 - ...horizationpolicy_service-cache-server.yaml | 15 - ...-webhook-admission-webhook-parameters.yaml | 14 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ...app-jupyter-web-app-config-8kcgd8t8th.yaml | 196 - .../~g_v1_configmap_katib-config.yaml | 66 - .../~g_v1_configmap_kubeflow-config.yaml | 11 - ...es-profile-controller-code-7g6bb7c22k.yaml | 280 - ...nes-profile-controller-env-mgh6th2gff.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - .../~g_v1_configmap_mpi-operator-config.yaml | 12 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...pipeline-api-server-config-f4t72426kt.yaml | 13 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_configmap_trial-template.yaml | 77 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 22 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 11 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - ..._v1_service_admission-webhook-service.yaml | 19 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../~g_v1_service_centraldashboard.yaml | 31 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...kubeflow-pipelines-profile-controller.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ...1_service_notebook-controller-service.yaml | 14 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - .../~g_v1_service_pytorch-operator.yaml | 25 - .../~g_v1_service_seldon-webhook-service.yaml | 22 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...unt_admission-webhook-service-account.yaml | 10 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...count_jupyter-web-app-service-account.yaml | 8 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_mpi-operator.yaml | 10 - .../~g_v1_serviceaccount_mxnet-operator.yaml | 10 - ...t_notebook-controller-service-account.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - ...t_profiles-controller-service-account.yaml | 7 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - .../application/argo/kustomize_test.go | 15 - ...ourcedefinition_workflows.argoproj.io.yaml | 19 - .../app.k8s.io_v1beta1_application_argo.yaml | 39 - .../expected/apps_v1_deployment_argo-ui.yaml | 66 - ...pps_v1_deployment_workflow-controller.yaml | 61 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 25 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 35 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 54 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 17 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 17 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...nfigmap_workflow-controller-configmap.yaml | 32 - ...figmap_workflow-controller-parameters.yaml | 23 - .../expected/~g_v1_service_argo-ui.yaml | 21 - .../~g_v1_serviceaccount_argo-ui.yaml | 9 - .../expected/~g_v1_serviceaccount_argo.yaml | 9 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 9 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 35 - ...ookconfiguration_cert-manager-webhook.yaml | 34 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 19 - ...s.io_v1beta1_application_cert-manager.yaml | 41 - ...v1_deployment_cert-manager-cainjector.yaml | 41 - ...ps_v1_deployment_cert-manager-webhook.yaml | 50 - .../apps_v1_deployment_cert-manager.yaml | 54 - ...erissuer_kubeflow-self-signing-issuer.yaml | 11 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 24 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 23 - ...ert-manager-webhook:webhook-requester.yaml | 19 - ...1_clusterrole_cert-manager-cainjector.yaml | 63 - ..._cert-manager-controller-certificates.yaml | 64 - ...le_cert-manager-controller-challenges.yaml | 86 - ...ert-manager-controller-clusterissuers.yaml | 43 - ..._cert-manager-controller-ingress-shim.yaml | 51 - ...rrole_cert-manager-controller-issuers.yaml | 43 - ...errole_cert-manager-controller-orders.yaml | 63 - ...errolebinding_cert-manager-cainjector.yaml | 17 - ..._cert-manager-controller-certificates.yaml | 17 - ...ng_cert-manager-controller-challenges.yaml | 17 - ...ert-manager-controller-clusterissuers.yaml | 17 - ..._cert-manager-controller-ingress-shim.yaml | 17 - ...nding_cert-manager-controller-issuers.yaml | 17 - ...inding_cert-manager-controller-orders.yaml | 17 - ...g_cert-manager-webhook:auth-delegator.yaml | 18 - ..._v1_configmap_cert-manager-parameters.yaml | 11 - .../~g_v1_namespace_cert-manager.yaml | 8 - .../~g_v1_service_cert-manager-webhook.yaml | 21 - .../expected/~g_v1_service_cert-manager.yaml | 21 - ...erviceaccount_cert-manager-cainjector.yaml | 10 - ...1_serviceaccount_cert-manager-webhook.yaml | 10 - .../~g_v1_serviceaccount_cert-manager.yaml | 10 - .../kustomize_test.go | 15 - ...s_v1_deployment_cluster-local-gateway.yaml | 185 - ...alpodautoscaler_cluster-local-gateway.yaml | 21 - ...isruptionbudget_cluster-local-gateway.yaml | 16 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 28 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...onfigmap_cluster-local-gateway-config.yaml | 9 - .../~g_v1_namespace_istio-system.yaml | 6 - .../~g_v1_service_cluster-local-gateway.yaml | 41 - ...cluster-local-gateway-service-account.yaml | 8 - .../~g_v1_serviceaccount_istio-multi.yaml | 7 - .../istio-1-3-1-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 27 - ...cedefinition_adapters.config.istio.io.yaml | 23 - ...on_attributemanifests.config.istio.io.yaml | 23 - ...n_authorizationpolicies.rbac.istio.io.yaml | 22 - ...ition_certificates.certmanager.k8s.io.yaml | 42 - ...inition_challenges.certmanager.k8s.io.yaml | 34 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 17 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 36 - ...tion_envoyfilters.networking.istio.io.yaml | 21 - ...finition_gateways.networking.istio.io.yaml | 23 - ...cedefinition_handlers.config.istio.io.yaml | 23 - ...n_httpapispecbindings.config.istio.io.yaml | 21 - ...finition_httpapispecs.config.istio.io.yaml | 21 - ...edefinition_instances.config.istio.io.yaml | 23 - ...definition_issuers.certmanager.k8s.io.yaml | 17 - ..._meshpolicies.authentication.istio.io.yaml | 22 - ...edefinition_orders.certmanager.k8s.io.yaml | 36 - ...tion_policies.authentication.istio.io.yaml | 21 - ...ion_quotaspecbindings.config.istio.io.yaml | 21 - ...definition_quotaspecs.config.istio.io.yaml | 21 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 23 - ...ourcedefinition_rules.config.istio.io.yaml | 23 - ...on_serviceentries.networking.istio.io.yaml | 45 - ...ion_servicerolebindings.rbac.istio.io.yaml | 35 - ...definition_serviceroles.rbac.istio.io.yaml | 23 - ...finition_sidecars.networking.istio.io.yaml | 21 - ...edefinition_templates.config.istio.io.yaml | 23 - ...n_virtualservices.networking.istio.io.yaml | 40 - .../apps_v1_daemonset_istio-nodeagent.yaml | 87 - .../apps_v1_deployment_istio-citadel.yaml | 78 - .../apps_v1_deployment_istio-galley.yaml | 122 - ...ps_v1_deployment_istio-ingressgateway.yaml | 202 - .../apps_v1_deployment_istio-pilot.yaml | 185 - .../apps_v1_deployment_istio-policy.yaml | 175 - ..._v1_deployment_istio-sidecar-injector.yaml | 117 - .../apps_v1_deployment_istio-telemetry.yaml | 185 - .../apps_v1_deployment_prometheus.yaml | 87 - ...talpodautoscaler_istio-ingressgateway.yaml | 20 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 19 - ..._horizontalpodautoscaler_istio-policy.yaml | 19 - ...rizontalpodautoscaler_istio-telemetry.yaml | 19 - ...post-install-release-1.3-latest-daily.yaml | 64 - ...v1alpha2_attributemanifest_istioproxy.yaml | 137 - ...v1alpha2_attributemanifest_kubernetes.yaml | 61 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 9 - ....istio.io_v1alpha2_handler_prometheus.yaml | 213 - ...istio.io_v1alpha2_instance_attributes.yaml | 36 - ...tio.io_v1alpha2_instance_requestcount.yaml | 36 - ....io_v1alpha2_instance_requestduration.yaml | 36 - ...stio.io_v1alpha2_instance_requestsize.yaml | 36 - ...tio.io_v1alpha2_instance_responsesize.yaml | 36 - ....io_v1alpha2_instance_tcpbytereceived.yaml | 32 - ...stio.io_v1alpha2_instance_tcpbytesent.yaml | 32 - ...1alpha2_instance_tcpconnectionsclosed.yaml | 32 - ...1alpha2_instance_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 12 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 18 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 14 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 13 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 13 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 13 - ...v1alpha3_destinationrule_istio-policy.yaml | 19 - ...lpha3_destinationrule_istio-telemetry.yaml | 19 - ...eta1_poddisruptionbudget_istio-galley.yaml | 14 - ...disruptionbudget_istio-ingressgateway.yaml | 14 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 14 - ...eta1_poddisruptionbudget_istio-policy.yaml | 17 - ...sruptionbudget_istio-sidecar-injector.yaml | 14 - ...1_poddisruptionbudget_istio-telemetry.yaml | 17 - ...lusterrole_istio-citadel-istio-system.yaml | 42 - ...clusterrole_istio-galley-istio-system.yaml | 90 - ..._clusterrole_istio-mixer-istio-system.yaml | 48 - ...sterrole_istio-nodeagent-istio-system.yaml | 13 - ..._clusterrole_istio-pilot-istio-system.yaml | 69 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 25 - ...1_clusterrole_prometheus-istio-system.yaml | 29 - ...olebinding_istio-citadel-istio-system.yaml | 14 - ...alley-admin-role-binding-istio-system.yaml | 14 - ...mixer-admin-role-binding-istio-system.yaml | 14 - ....io_v1_clusterrolebinding_istio-multi.yaml | 12 - ...ebinding_istio-nodeagent-istio-system.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 14 - ...ector-admin-role-binding-istio-system.yaml | 15 - ...errolebinding_prometheus-istio-system.yaml | 14 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 35 - ...ost-install-role-binding-istio-system.yaml | 14 - ...pha1_servicerole_istio-ingressgateway.yaml | 9 - ...rvicerolebinding_istio-ingressgateway.yaml | 11 - ...hift.io_v1_route_istio-ingressgateway.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 120 - .../~g_v1_configmap_istio-install-config.yaml | 7 - ...igmap_istio-security-custom-resources.yaml | 49 - ...g_v1_configmap_istio-sidecar-injector.yaml | 405 - .../expected/~g_v1_configmap_istio.yaml | 137 - .../expected/~g_v1_configmap_prometheus.yaml | 276 - .../~g_v1_namespace_istio-system.yaml | 4 - .../expected/~g_v1_service_istio-citadel.yaml | 18 - .../expected/~g_v1_service_istio-galley.yaml | 18 - .../~g_v1_service_istio-ingressgateway.yaml | 44 - .../expected/~g_v1_service_istio-pilot.yaml | 20 - .../expected/~g_v1_service_istio-policy.yaml | 21 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 23 - .../expected/~g_v1_service_prometheus.yaml | 16 - ...account_istio-citadel-service-account.yaml | 7 - ...eaccount_istio-galley-service-account.yaml | 7 - ..._istio-ingressgateway-service-account.yaml | 7 - ...ceaccount_istio-mixer-service-account.yaml | 7 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...count_istio-nodeagent-service-account.yaml | 7 - ...ceaccount_istio-pilot-service-account.yaml | 7 - ...t_istio-security-post-install-account.yaml | 7 - ...stio-sidecar-injector-service-account.yaml | 8 - .../~g_v1_serviceaccount_prometheus.yaml | 7 - .../application/istio-stack/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 30 - ...cedefinition_adapters.config.istio.io.yaml | 24 - ...rcedefinition_apikeys.config.istio.io.yaml | 24 - ...on_attributemanifests.config.istio.io.yaml | 24 - ...nition_authorizations.config.istio.io.yaml | 24 - ...cedefinition_bypasses.config.istio.io.yaml | 24 - ...ition_certificates.certmanager.k8s.io.yaml | 43 - ...inition_challenges.certmanager.k8s.io.yaml | 35 - ...inition_checknothings.config.istio.io.yaml | 24 - ...definition_circonuses.config.istio.io.yaml | 24 - ...finition_cloudwatches.config.istio.io.yaml | 21 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 18 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 22 - ...rcedefinition_deniers.config.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 37 - ...definition_dogstatsds.config.istio.io.yaml | 21 - ...ourcedefinition_edges.config.istio.io.yaml | 24 - ...tion_envoyfilters.networking.istio.io.yaml | 22 - ...cedefinition_fluentds.config.istio.io.yaml | 24 - ...finition_gateways.networking.istio.io.yaml | 24 - ...cedefinition_handlers.config.istio.io.yaml | 24 - ...n_httpapispecbindings.config.istio.io.yaml | 22 - ...finition_httpapispecs.config.istio.io.yaml | 22 - ...edefinition_instances.config.istio.io.yaml | 24 - ...definition_issuers.certmanager.k8s.io.yaml | 18 - ...nition_kubernetesenvs.config.istio.io.yaml | 24 - ...finition_kuberneteses.config.istio.io.yaml | 24 - ...finition_listcheckers.config.istio.io.yaml | 24 - ...efinition_listentries.config.istio.io.yaml | 24 - ...definition_logentries.config.istio.io.yaml | 45 - ...edefinition_memquotas.config.istio.io.yaml | 24 - ..._meshpolicies.authentication.istio.io.yaml | 23 - ...rcedefinition_metrics.config.istio.io.yaml | 24 - ...ourcedefinition_noops.config.istio.io.yaml | 24 - ...sourcedefinition_opas.config.istio.io.yaml | 24 - ...edefinition_orders.certmanager.k8s.io.yaml | 37 - ...tion_policies.authentication.istio.io.yaml | 22 - ...finition_prometheuses.config.istio.io.yaml | 24 - ...urcedefinition_quotas.config.istio.io.yaml | 24 - ...ion_quotaspecbindings.config.istio.io.yaml | 22 - ...definition_quotaspecs.config.istio.io.yaml | 22 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 24 - ...ourcedefinition_rbacs.config.istio.io.yaml | 24 - ...efinition_redisquotas.config.istio.io.yaml | 21 - ...nition_reportnothings.config.istio.io.yaml | 24 - ...ourcedefinition_rules.config.istio.io.yaml | 24 - ...on_serviceentries.networking.istio.io.yaml | 46 - ...ion_servicerolebindings.rbac.istio.io.yaml | 36 - ...definition_serviceroles.rbac.istio.io.yaml | 24 - ...finition_sidecars.networking.istio.io.yaml | 22 - ...edefinition_signalfxs.config.istio.io.yaml | 24 - ...finition_solarwindses.config.istio.io.yaml | 24 - ...finition_stackdrivers.config.istio.io.yaml | 24 - ...rcedefinition_statsds.config.istio.io.yaml | 24 - ...urcedefinition_stdios.config.istio.io.yaml | 24 - ...edefinition_templates.config.istio.io.yaml | 24 - ...definition_tracespans.config.istio.io.yaml | 24 - ...n_virtualservices.networking.istio.io.yaml | 41 - ...rcedefinition_zipkins.config.istio.io.yaml | 21 - .../expected/apps_v1_deployment_grafana.yaml | 152 - .../apps_v1_deployment_istio-citadel.yaml | 90 - ...pps_v1_deployment_istio-egressgateway.yaml | 171 - .../apps_v1_deployment_istio-galley.yaml | 133 - ...ps_v1_deployment_istio-ingressgateway.yaml | 177 - .../apps_v1_deployment_istio-pilot.yaml | 175 - .../apps_v1_deployment_istio-policy.yaml | 168 - ..._v1_deployment_istio-sidecar-injector.yaml | 125 - .../apps_v1_deployment_istio-telemetry.yaml | 172 - .../apps_v1_deployment_istio-tracing.yaml | 99 - .../expected/apps_v1_deployment_kiali.yaml | 97 - .../apps_v1_deployment_prometheus.yaml | 93 - ...ntalpodautoscaler_istio-egressgateway.yaml | 22 - ...talpodautoscaler_istio-ingressgateway.yaml | 22 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 22 - ..._horizontalpodautoscaler_istio-policy.yaml | 22 - ...rizontalpodautoscaler_istio-telemetry.yaml | 22 - ...ch_v1_job_istio-cleanup-secrets-1.1.6.yaml | 72 - ..._job_istio-grafana-post-install-1.1.6.yaml | 72 - ...job_istio-security-post-install-1.1.6.yaml | 73 - ...v1alpha2_attributemanifest_istioproxy.yaml | 138 - ...v1alpha2_attributemanifest_kubernetes.yaml | 64 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 13 - ....istio.io_v1alpha2_handler_prometheus.yaml | 216 - ...onfig.istio.io_v1alpha2_handler_stdio.yaml | 14 - ...tio.io_v1alpha2_kubernetes_attributes.yaml | 37 - ....istio.io_v1alpha2_logentry_accesslog.yaml | 58 - ...tio.io_v1alpha2_logentry_tcpaccesslog.yaml | 43 - ...istio.io_v1alpha2_metric_requestcount.yaml | 36 - ...io.io_v1alpha2_metric_requestduration.yaml | 36 - ....istio.io_v1alpha2_metric_requestsize.yaml | 36 - ...istio.io_v1alpha2_metric_responsesize.yaml | 36 - ...io.io_v1alpha2_metric_tcpbytereceived.yaml | 32 - ....istio.io_v1alpha2_metric_tcpbytesent.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsclosed.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 15 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 20 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 17 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 16 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 16 - .../config.istio.io_v1alpha2_rule_stdio.yaml | 16 - ...onfig.istio.io_v1alpha2_rule_stdiotcp.yaml | 16 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 16 - ...v1alpha3_destinationrule_istio-policy.yaml | 17 - ...lpha3_destinationrule_istio-telemetry.yaml | 17 - ...ddisruptionbudget_istio-egressgateway.yaml | 18 - ...eta1_poddisruptionbudget_istio-galley.yaml | 18 - ...disruptionbudget_istio-ingressgateway.yaml | 18 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 18 - ...eta1_poddisruptionbudget_istio-policy.yaml | 21 - ...1_poddisruptionbudget_istio-telemetry.yaml | 21 - ...lusterrole_istio-citadel-istio-system.yaml | 44 - ...le_istio-cleanup-secrets-istio-system.yaml | 21 - ...role_istio-egressgateway-istio-system.yaml | 21 - ...clusterrole_istio-galley-istio-system.yaml | 85 - ...tio-grafana-post-install-istio-system.yaml | 16 - ...ole_istio-ingressgateway-istio-system.yaml | 21 - ..._clusterrole_istio-mixer-istio-system.yaml | 51 - ..._clusterrole_istio-pilot-istio-system.yaml | 73 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 28 - ...on.k8s.io_v1_clusterrole_kiali-viewer.yaml | 124 - ...orization.k8s.io_v1_clusterrole_kiali.yaml | 134 - ...1_clusterrole_prometheus-istio-system.yaml | 32 - ...olebinding_istio-citadel-istio-system.yaml | 17 - ...ng_istio-cleanup-secrets-istio-system.yaml | 21 - ...ding_istio-egressgateway-istio-system.yaml | 17 - ...alley-admin-role-binding-istio-system.yaml | 17 - ...ost-install-role-binding-istio-system.yaml | 17 - ...ing_istio-ingressgateway-istio-system.yaml | 17 - ...kiali-admin-role-binding-istio-system.yaml | 17 - ...mixer-admin-role-binding-istio-system.yaml | 17 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 17 - ...ector-admin-role-binding-istio-system.yaml | 18 - ...errolebinding_prometheus-istio-system.yaml | 17 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 38 - ...ost-install-role-binding-istio-system.yaml | 17 - ...hift.io_v1_route_istio-ingressgateway.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 123 - ...iguration-dashboards-galley-dashboard.yaml | 341 - ...ation-dashboards-istio-mesh-dashboard.yaml | 229 - ...ashboards-istio-performance-dashboard.yaml | 150 - ...on-dashboards-istio-service-dashboard.yaml | 795 -- ...n-dashboards-istio-workload-dashboard.yaml | 744 -- ...figuration-dashboards-mixer-dashboard.yaml | 359 - ...figuration-dashboards-pilot-dashboard.yaml | 307 - ...figmap_istio-grafana-custom-resources.yaml | 59 - .../~g_v1_configmap_istio-grafana.yaml | 34 - ...igmap_istio-security-custom-resources.yaml | 58 - ...g_v1_configmap_istio-sidecar-injector.yaml | 102 - .../expected/~g_v1_configmap_istio.yaml | 77 - .../expected/~g_v1_configmap_kiali.yaml | 14 - .../expected/~g_v1_configmap_prometheus.yaml | 313 - .../~g_v1_namespace_istio-system.yaml | 6 - .../expected/~g_v1_secret_kiali.yaml | 14 - .../expected/~g_v1_service_grafana.yaml | 19 - .../expected/~g_v1_service_istio-citadel.yaml | 21 - .../~g_v1_service_istio-egressgateway.yaml | 25 - .../expected/~g_v1_service_istio-galley.yaml | 21 - .../~g_v1_service_istio-ingressgateway.yaml | 48 - .../expected/~g_v1_service_istio-pilot.yaml | 23 - .../expected/~g_v1_service_istio-policy.yaml | 24 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 26 - .../expected/~g_v1_service_jaeger-agent.yaml | 28 - .../~g_v1_service_jaeger-collector.yaml | 24 - .../expected/~g_v1_service_jaeger-query.yaml | 19 - .../expected/~g_v1_service_kiali.yaml | 17 - .../expected/~g_v1_service_prometheus.yaml | 19 - .../expected/~g_v1_service_tracing.yaml | 19 - .../expected/~g_v1_service_zipkin.yaml | 19 - ...account_istio-citadel-service-account.yaml | 10 - ...istio-cleanup-secrets-service-account.yaml | 14 - ...t_istio-egressgateway-service-account.yaml | 10 - ...eaccount_istio-galley-service-account.yaml | 10 - ...nt_istio-grafana-post-install-account.yaml | 10 - ..._istio-ingressgateway-service-account.yaml | 10 - ...ceaccount_istio-mixer-service-account.yaml | 10 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...ceaccount_istio-pilot-service-account.yaml | 10 - ...t_istio-security-post-install-account.yaml | 10 - ...stio-sidecar-injector-service-account.yaml | 11 - ..._serviceaccount_kiali-service-account.yaml | 10 - .../~g_v1_serviceaccount_prometheus.yaml | 10 - .../application/istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - ...configmap_istio-parameters-t6hhgfg9k2.yaml | 10 - .../jupyter-web-app/kustomize_test.go | 15 - ...ation_jupyter-web-app-jupyter-web-app.yaml | 51 - ...deployment_jupyter-web-app-deployment.yaml | 46 - ...rvice_jupyter-web-app-jupyter-web-app.yaml | 28 - ...sterrole_jupyter-web-app-cluster-role.yaml | 57 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 9 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 20 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 26 - ..._jupyter-web-app-cluster-role-binding.yaml | 15 - ...jupyter-web-app-jupyter-notebook-role.yaml | 39 - ...web-app-jupyter-notebook-role-binding.yaml | 15 - ...app-jupyter-web-app-config-c7ckdh44mc.yaml | 136 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...~g_v1_service_jupyter-web-app-service.yaml | 29 - ...count_jupyter-web-app-service-account.yaml | 8 - .../application/katib/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 31 - ...cedefinition_suggestions.kubeflow.org.yaml | 37 - ...esourcedefinition_trials.kubeflow.org.yaml | 31 - ..._v1beta1_application_katib-controller.yaml | 70 - ...k8s.io_v1beta1_application_katib-crds.yaml | 68 - .../apps_v1_deployment_katib-controller.yaml | 62 - .../apps_v1_deployment_katib-db-manager.yaml | 60 - .../apps_v1_deployment_katib-mysql.yaml | 84 - .../expected/apps_v1_deployment_katib-ui.yaml | 46 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 24 - ...8s.io_v1_clusterrole_katib-controller.yaml | 92 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 23 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 13 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 25 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 19 - ...1_clusterrolebinding_katib-controller.yaml | 15 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 15 - .../~g_v1_configmap_katib-config.yaml | 66 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - .../~g_v1_configmap_trial-template.yaml | 77 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 14 - .../~g_v1_secret_katib-controller.yaml | 8 - .../~g_v1_secret_katib-mysql-secrets.yaml | 13 - .../~g_v1_service_katib-controller.yaml | 25 - .../~g_v1_service_katib-db-manager.yaml | 21 - .../expected/~g_v1_service_katib-mysql.yaml | 21 - .../expected/~g_v1_service_katib-ui.yaml | 22 - ...~g_v1_serviceaccount_katib-controller.yaml | 8 - .../~g_v1_serviceaccount_katib-ui.yaml | 8 - .../application/kfp-tekton/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_metadata-writer.yaml | 37 - .../expected/apps_v1_deployment_minio.yaml | 51 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 148 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 48 - ...ole_ml-pipeline-persistenceagent-role.yaml | 35 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 55 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 56 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 56 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 96 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ...ev_v1alpha1_condition_super-condition.yaml | 25 - .../~g_v1_configmap_kfp-tekton-config.yaml | 31 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 14 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 17 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../application/metadata/kustomize_test.go | 15 - .../apps_v1_deployment_metadata-db.yaml | 57 - ..._deployment_metadata-envoy-deployment.yaml | 30 - ...1_deployment_metadata-grpc-deployment.yaml | 44 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 22 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...g_v1_configmap_metadata-db-parameters.yaml | 11 - ..._v1_configmap_metadata-grpc-configmap.yaml | 10 - ...g_v1_configmap_metadata-ui-parameters.yaml | 9 - ..._persistentvolumeclaim_metadata-mysql.yaml | 13 - .../~g_v1_secret_metadata-db-secrets.yaml | 11 - .../expected/~g_v1_service_metadata-db.yaml | 17 - .../~g_v1_service_metadata-envoy-service.yaml | 17 - .../~g_v1_service_metadata-grpc-service.yaml | 17 - .../~g_v1_serviceaccount_metadatadb.yaml | 7 - .../notebook-controller/kustomize_test.go | 15 - ...urcedefinition_notebooks.kubeflow.org.yaml | 94 - ...tebook-controller-notebook-controller.yaml | 42 - ...oyment_notebook-controller-deployment.yaml | 47 - ...k-controller-kubeflow-notebooks-admin.yaml | 13 - ...ok-controller-kubeflow-notebooks-edit.yaml | 24 - ...ok-controller-kubeflow-notebooks-view.yaml | 18 - ..._clusterrole_notebook-controller-role.yaml | 52 - ...ding_notebook-controller-role-binding.yaml | 15 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...notebook-controller-config-h4d668t5tb.yaml | 11 - ...1_service_notebook-controller-service.yaml | 14 - ...t_notebook-controller-service-account.yaml | 8 - .../openshift/openshift-scc/kustomize_test.go | 15 - ...textconstraints_kubeflow-anyuid-istio.yaml | 51 - ...tconstraints_kubeflow-anyuid-kubeflow.yaml | 44 - ...constraints_kubeflow-privileged-istio.yaml | 43 - ...extconstraints_tekton-anyuid-kubeflow.yaml | 40 - .../~g_v1_configmap_scc-namespace-check.yaml | 8 - .../application/pipeline/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 21 - ...sourcedefinition_viewers.kubeflow.org.yaml | 21 - ...1beta1_application_kubeflow-pipelines.yaml | 44 - .../app.k8s.io_v1beta1_application_minio.yaml | 31 - .../app.k8s.io_v1beta1_application_mysql.yaml | 32 - ..._deployment_cache-deployer-deployment.yaml | 36 - .../apps_v1_deployment_cache-server.yaml | 79 - .../apps_v1_deployment_metadata-writer.yaml | 32 - .../expected/apps_v1_deployment_minio.yaml | 53 - ...ployment_ml-pipeline-persistenceagent.yaml | 34 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 32 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 80 - ..._v1_deployment_ml-pipeline-viewer-crd.yaml | 34 - ...yment_ml-pipeline-visualizationserver.yaml | 54 - .../apps_v1_deployment_ml-pipeline.yaml | 103 - .../expected/apps_v1_deployment_mysql.yaml | 40 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 25 - ...-pipelines-cache-deployer-clusterrole.yaml | 37 - ...nes-cache-deployer-clusterrolebinding.yaml | 15 - ...ubeflow-pipelines-cache-deployer-role.yaml | 20 - ...v1_role_kubeflow-pipelines-cache-role.yaml | 36 - ...beflow-pipelines-metadata-writer-role.yaml | 36 - ...ole_ml-pipeline-persistenceagent-role.yaml | 25 - ...le_ml-pipeline-scheduledworkflow-role.yaml | 41 - ...ization.k8s.io_v1_role_ml-pipeline-ui.yaml | 47 - ...le_ml-pipeline-viewer-controller-role.yaml | 34 - ...horization.k8s.io_v1_role_ml-pipeline.yaml | 41 - ...zation.k8s.io_v1_role_pipeline-runner.yaml | 84 - ...ding_kubeflow-pipelines-cache-binding.yaml | 16 - ...-pipelines-cache-deployer-rolebinding.yaml | 16 - ...low-pipelines-metadata-writer-binding.yaml | 16 - ..._ml-pipeline-persistenceagent-binding.yaml | 16 - ...ml-pipeline-scheduledworkflow-binding.yaml | 16 - ....k8s.io_v1_rolebinding_ml-pipeline-ui.yaml | 17 - ...inding_ml-pipeline-viewer-crd-binding.yaml | 16 - ...ion.k8s.io_v1_rolebinding_ml-pipeline.yaml | 17 - ...1_rolebinding_pipeline-runner-binding.yaml | 16 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...v1_configmap_ml-pipeline-ui-configmap.yaml | 15 - ...ap_pipeline-install-config-2829cc67f8.yaml | 15 - ...ne-upstream-install-config-d7hkh24mdg.yaml | 18 - ...~g_v1_persistentvolumeclaim_minio-pvc.yaml | 14 - ..._persistentvolumeclaim_mysql-pv-claim.yaml | 15 - ...g_v1_secret_mlpipeline-minio-artifact.yaml | 12 - .../~g_v1_secret_mysql-secret-fd5gktm75t.yaml | 12 - .../expected/~g_v1_service_cache-server.yaml | 16 - .../expected/~g_v1_service_minio-service.yaml | 18 - .../~g_v1_service_ml-pipeline-ui.yaml | 19 - ...rvice_ml-pipeline-visualizationserver.yaml | 18 - .../expected/~g_v1_service_ml-pipeline.yaml | 22 - .../expected/~g_v1_service_mysql.yaml | 18 - ..._kubeflow-pipelines-cache-deployer-sa.yaml | 8 - ...rviceaccount_kubeflow-pipelines-cache.yaml | 8 - ..._kubeflow-pipelines-container-builder.yaml | 8 - ...nt_kubeflow-pipelines-metadata-writer.yaml | 8 - ...viceaccount_kubeflow-pipelines-viewer.yaml | 8 - ...eaccount_ml-pipeline-persistenceagent.yaml | 8 - ...account_ml-pipeline-scheduledworkflow.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 8 - ...l-pipeline-viewer-crd-service-account.yaml | 8 - ...count_ml-pipeline-visualizationserver.yaml | 8 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 8 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 8 - .../application/profiles/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ...v1beta1_application_profiles-profiles.yaml | 40 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...binding_profiles-cluster-role-binding.yaml | 14 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - ...t_profiles-controller-service-account.yaml | 7 - .../application/pytorch-job/kustomize_test.go | 15 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 45 - ..._v1beta1_application_pytorch-job-crds.yaml | 46 - ..._v1beta1_application_pytorch-operator.yaml | 49 - .../apps_v1_deployment_pytorch-operator.yaml | 45 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 14 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 26 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 20 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 33 - ...1_clusterrolebinding_pytorch-operator.yaml | 17 - .../~g_v1_service_pytorch-operator.yaml | 25 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 10 - .../application/seldon/kustomize_test.go | 15 - ...tating-webhook-configuration-kubeflow.yaml | 89 - ...dating-webhook-configuration-kubeflow.yaml | 89 - ...deployments.machinelearning.seldon.io.yaml | 7196 ---------------- ...eta1_application_seldon-core-operator.yaml | 46 - ..._deployment_seldon-controller-manager.yaml | 180 - ...lpha2_certificate_seldon-serving-cert.yaml | 20 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 13 - ...sterrole_seldon-manager-role-kubeflow.yaml | 227 - ...role_seldon-manager-sas-role-kubeflow.yaml | 36 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 18 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 18 - ...o_v1_role_seldon-leader-election-role.yaml | 38 - ...ng_seldon-leader-election-rolebinding.yaml | 19 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - .../~g_v1_configmap_seldon-config.yaml | 17 - .../~g_v1_service_seldon-webhook-service.yaml | 23 - .../~g_v1_serviceaccount_seldon-manager.yaml | 11 - .../application/tf-job/kustomize_test.go | 15 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 50 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 46 - ...o_v1beta1_application_tf-job-operator.yaml | 47 - .../apps_v1_deployment_tf-job-operator.yaml | 43 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 14 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 25 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 19 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 40 - ...a1_clusterrolebinding_tf-job-operator.yaml | 17 - .../~g_v1_service_tf-job-operator.yaml | 25 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 10 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 10 - tests/stacks/openshift/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 158 - ..._v1beta1_application_centraldashboard.yaml | 53 - ...v1beta1_application_profiles-profiles.yaml | 40 - .../apps_v1_deployment_centraldashboard.yaml | 55 - ...pps_v1_deployment_profiles-deployment.yaml | 97 - ...lpha3_virtualservice_centraldashboard.yaml | 24 - ...v1alpha3_virtualservice_profiles-kfam.yaml | 27 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 20 - ...1_clusterrolebinding_centraldashboard.yaml | 17 - ...binding_profiles-cluster-role-binding.yaml | 14 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 30 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 18 - ...nfigmap_centraldashboard-links-config.yaml | 88 - ..._configmap_kubeflow-config-f5fk62kk74.yaml | 11 - ...p_profiles-profiles-config-4mgcmtgk6t.yaml | 10 - .../~g_v1_service_centraldashboard.yaml | 31 - .../expected/~g_v1_service_profiles-kfam.yaml | 12 - ...~g_v1_serviceaccount_centraldashboard.yaml | 10 - ...t_profiles-controller-service-account.yaml | 7 - tests/test_util.go | 197 - tests/testdata_gcp_kpt/gcp/Kptfile | 876 -- tests/testdata_gcp_kpt/gcp/v2/README.md | 88 - .../gcp/v2/asm/istio-operator.yaml | 38 - .../gcp/v2/cnrm/cluster/README.md | 17 - .../gcp/v2/cnrm/cluster/cluster.yaml | 62 - .../gcp/v2/cnrm/cluster/kf-vm-policy.yaml | 71 - .../gcp/v2/cnrm/cluster/kf-vm-sa.yaml | 20 - .../gcp/v2/cnrm/cluster/kustomization.yaml | 6 - .../gcp/v2/cnrm/cluster/nodepool.yaml | 35 - .../gcp/v2/cnrm/gcp-services.yaml | 143 - .../cnrm/iam/admin-manages-user-policy.yaml | 13 - .../gcp/v2/cnrm/iam/kf-admin-policy.yaml | 167 - .../gcp/v2/cnrm/iam/kf-admin-sa.yaml | 20 - .../kf-admin-workload-identity-bindings.yaml | 36 - .../gcp/v2/cnrm/iam/kf-user-policy.yaml | 143 - .../gcp/v2/cnrm/iam/kf-user-sa.yaml | 20 - .../kf-user-workload-identity-bindings.yaml | 35 - .../gcp/v2/cnrm/iam/kustomization.yaml | 10 - .../gcp/v2/cnrm/ingress/compute-address.yaml | 11 - .../gcp/v2/cnrm/ingress/kustomization.yaml | 4 - .../gcp/v2/cnrm/kustomization.yaml | 8 - .../gcp/v2/cnrm/pipelines/disk.yaml | 15 - .../gcp/v2/cnrm/pipelines/kustomization.yaml | 4 - .../gcp/v2/management/cluster/README.md | 2 - .../gcp/v2/management/cluster/cluster.yaml | 26 - .../management/cluster/enable-services.yaml | 7 - .../v2/management/cluster/kustomization.yaml | 4 - .../gcp/v2/management/cluster/nodepool.yaml | 28 - .../gcp/v2/management/cnrm-install/README.md | 12 - .../cnrm-install/enable-services.yaml | 8 - .../gcp/v2/management/cnrm-install/iam.yaml | 36 - .../install-system/0-cnrm-system.yaml | 581 -- .../cnrm-install/install-system/crds.yaml | 3321 -------- .../install-system/kustomization.yaml | 5 - .../gcp/v2/privateGKE/README.md | 4 - .../v2/privateGKE/cluster-private-patch.yaml | 38 - .../gcp/v2/privateGKE/compute-network.yaml | 58 - .../gcp/v2/privateGKE/dns-gcr.yaml | 41 - .../gcp/v2/privateGKE/dns-google-apis.yaml | 41 - .../gcp/v2/privateGKE/enable-services.yaml | 10 - .../gcp/v2/privateGKE/firewall.yaml | 255 - .../gcp/v2/privateGKE/kustomization.yaml | 12 - .../gcp/v2/privateGKE/kustomize-fns/README.md | 4 - .../kustomize-fns/image_prefix.yaml | 17 - .../gcp/v2/privateGKE/nat.yaml | 20 - .../api-service/kustomize_test.go | 15 - ...8s.io_v1beta1_application_api-service.yaml | 39 - .../apps_v1_deployment_ml-pipeline.yaml | 61 - ...ation.k8s.io_v1beta1_role_ml-pipeline.yaml | 43 - ...8s.io_v1beta1_rolebinding_ml-pipeline.yaml | 21 - .../~g_v1_configmap_ml-pipeline-config.yaml | 33 - .../expected/~g_v1_service_ml-pipeline.yaml | 31 - .../~g_v1_serviceaccount_ml-pipeline.yaml | 13 - .../application-crds/kustomize_test.go | 15 - ...rcedefinition_applications.app.k8s.io.yaml | 233 - .../application/kustomize_test.go | 15 - ...p.k8s.io_v1beta1_application_kubeflow.yaml | 42 - ...t_application-controller-stateful-set.yaml | 47 - ...e_application-controller-cluster-role.yaml | 28 - ...ation-controller-cluster-role-binding.yaml | 19 - ...map_application-controller-parameters.yaml | 15 - ...ervice_application-controller-service.yaml | 22 - ...pplication-controller-service-account.yaml | 12 - .../argo/kustomize_test.go | 15 - ...ourcedefinition_workflows.argoproj.io.yaml | 23 - .../app.k8s.io_v1beta1_application_argo.yaml | 42 - .../expected/apps_v1_deployment_argo-ui.yaml | 78 - ...pps_v1_deployment_workflow-controller.yaml | 73 - ...io.io_v1alpha3_virtualservice_argo-ui.yaml | 28 - ...on.k8s.io_v1beta1_clusterrole_argo-ui.yaml | 39 - ...ation.k8s.io_v1beta1_clusterrole_argo.yaml | 58 - ...io_v1beta1_clusterrolebinding_argo-ui.yaml | 21 - ...8s.io_v1beta1_clusterrolebinding_argo.yaml | 21 - ...nfigmap_workflow-controller-configmap.yaml | 36 - ...figmap_workflow-controller-parameters.yaml | 27 - .../expected/~g_v1_service_argo-ui.yaml | 29 - .../~g_v1_serviceaccount_argo-ui.yaml | 13 - .../expected/~g_v1_serviceaccount_argo.yaml | 13 - .../bootstrap/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_bootstrap.yaml | 41 - ...ission-webhook-bootstrap-stateful-set.yaml | 54 - ...ission-webhook-bootstrap-cluster-role.yaml | 32 - ...ebhook-bootstrap-cluster-role-binding.yaml | 20 - ...dmission-webhook-bootstrap-config-map.yaml | 143 - ...ion-webhook-bootstrap-service-account.yaml | 13 - .../centraldashboard/kustomize_test.go | 15 - ..._v1beta1_application_centraldashboard.yaml | 57 - .../apps_v1_deployment_centraldashboard.yaml | 65 - ...lpha3_virtualservice_centraldashboard.yaml | 28 - ...8s.io_v1_clusterrole_centraldashboard.yaml | 24 - ...1_clusterrolebinding_centraldashboard.yaml | 21 - ...ation.k8s.io_v1_role_centraldashboard.yaml | 34 - ...8s.io_v1_rolebinding_centraldashboard.yaml | 22 - .../expected/~g_v1_configmap_parameters.yaml | 19 - .../~g_v1_service_centraldashboard.yaml | 39 - ...~g_v1_serviceaccount_centraldashboard.yaml | 13 - .../cert-manager-crds/kustomize_test.go | 15 - ...n_certificaterequests.cert-manager.io.yaml | 181 - ...finition_certificates.cert-manager.io.yaml | 235 - ...ition_challenges.acme.cert-manager.io.yaml | 1369 ---- ...nition_clusterissuers.cert-manager.io.yaml | 1655 ---- ...rcedefinition_issuers.cert-manager.io.yaml | 1655 ---- ...efinition_orders.acme.cert-manager.io.yaml | 200 - .../kustomize_test.go | 15 - ...ert-manager-cainjector:leaderelection.yaml | 18 - ...eta1_role_cert-manager:leaderelection.yaml | 18 - ...ert-manager-cainjector:leaderelection.yaml | 17 - ...webhook:webhook-authentication-reader.yaml | 17 - ...lebinding_cert-manager:leaderelection.yaml | 17 - ...p_cert-manager-kube-params-parameters.yaml | 10 - .../cert-manager/kustomize_test.go | 15 - ...ookconfiguration_cert-manager-webhook.yaml | 39 - ...ookconfiguration_cert-manager-webhook.yaml | 38 - ...rvice_v1beta1.webhook.cert-manager.io.yaml | 23 - ...s.io_v1beta1_application_cert-manager.yaml | 45 - ...v1_deployment_cert-manager-cainjector.yaml | 53 - ...ps_v1_deployment_cert-manager-webhook.yaml | 62 - .../apps_v1_deployment_cert-manager.yaml | 66 - ...erissuer_kubeflow-self-signing-issuer.yaml | 15 - ...s.io_v1_clusterrole_cert-manager-edit.yaml | 28 - ...s.io_v1_clusterrole_cert-manager-view.yaml | 27 - ...ert-manager-webhook:webhook-requester.yaml | 23 - ...1_clusterrole_cert-manager-cainjector.yaml | 67 - ..._cert-manager-controller-certificates.yaml | 68 - ...le_cert-manager-controller-challenges.yaml | 90 - ...ert-manager-controller-clusterissuers.yaml | 47 - ..._cert-manager-controller-ingress-shim.yaml | 55 - ...rrole_cert-manager-controller-issuers.yaml | 47 - ...errole_cert-manager-controller-orders.yaml | 67 - ...errolebinding_cert-manager-cainjector.yaml | 21 - ..._cert-manager-controller-certificates.yaml | 21 - ...ng_cert-manager-controller-challenges.yaml | 21 - ...ert-manager-controller-clusterissuers.yaml | 21 - ..._cert-manager-controller-ingress-shim.yaml | 21 - ...nding_cert-manager-controller-issuers.yaml | 21 - ...inding_cert-manager-controller-orders.yaml | 21 - ...g_cert-manager-webhook:auth-delegator.yaml | 22 - ..._v1_configmap_cert-manager-parameters.yaml | 16 - .../~g_v1_namespace_cert-manager.yaml | 12 - .../~g_v1_service_cert-manager-webhook.yaml | 29 - .../expected/~g_v1_service_cert-manager.yaml | 29 - ...erviceaccount_cert-manager-cainjector.yaml | 14 - ...1_serviceaccount_cert-manager-webhook.yaml | 14 - .../~g_v1_serviceaccount_cert-manager.yaml | 14 - .../cloud-endpoints/kustomize_test.go | 15 - ...ion_cloudendpoints.ctl.isla.solutions.yaml | 24 - ...o_v1beta1_application_cloud-endpoints.yaml | 39 - ...deployment_cloud-endpoints-controller.yaml | 55 - ...controller_cloud-endpoints-controller.yaml | 30 - ...lusterrole_cloud-endpoints-controller.yaml | 30 - ...olebinding_cloud-endpoints-controller.yaml | 21 - ..._configmap_cloud-endpoints-parameters.yaml | 18 - ...v1_service_cloud-endpoints-controller.yaml | 28 - .../~g_v1_serviceaccount_kf-admin.yaml | 14 - .../default-install/kustomize_test.go | 15 - ...ow.org_v1beta1_profile_kubeflow-jlewi.yaml | 9 - ...map_default-install-config-6mcgbmmtg6.yaml | 10 - .../gpu-driver/kustomize_test.go | 15 - ...k8s.io_v1beta1_application_gpu-driver.yaml | 39 - ..._v1_daemonset_nvidia-driver-installer.yaml | 84 - .../iap-ingress/kustomize_test.go | 15 - ...8s.io_v1beta1_application_iap-ingress.yaml | 40 - .../apps_v1_deployment_iap-enabler.yaml | 62 - .../apps_v1_deployment_whoami-app.yaml | 53 - .../apps_v1_statefulset_backend-updater.yaml | 62 - ....istio.io_v1alpha1_policy_ingress-jwt.yaml | 30 - ...beta1_backendconfig_iap-backendconfig.yaml | 19 - ...solutions_v1_cloudendpoint_kf-v1-0210.yaml | 18 - ...a1_managedcertificate_gke-certificate.yaml | 16 - ....k8s.io_v1beta1_ingress_envoy-ingress.yaml | 29 - ...s.io_v1beta1_clusterrole_kf-admin-iap.yaml | 47 - ...beta1_clusterrolebinding_kf-admin-iap.yaml | 20 - .../~g_v1_configmap_envoy-config.yaml | 134 - ...v1_configmap_ingress-bootstrap-config.yaml | 36 - .../expected/~g_v1_configmap_parameters.yaml | 25 - .../expected/~g_v1_service_whoami-app.yaml | 28 - .../~g_v1_serviceaccount_kf-admin.yaml | 13 - .../istio-crds/kustomize_test.go | 15 - ...cedefinition_adapters.config.istio.io.yaml | 24 - ...rcedefinition_apikeys.config.istio.io.yaml | 24 - ...on_attributemanifests.config.istio.io.yaml | 24 - ...nition_authorizations.config.istio.io.yaml | 24 - ...cedefinition_bypasses.config.istio.io.yaml | 24 - ...ition_certificates.certmanager.k8s.io.yaml | 43 - ...inition_challenges.certmanager.k8s.io.yaml | 35 - ...inition_checknothings.config.istio.io.yaml | 24 - ...definition_circonuses.config.istio.io.yaml | 24 - ...finition_cloudwatches.config.istio.io.yaml | 21 - ...ion_clusterissuers.certmanager.k8s.io.yaml | 18 - ...tion_clusterrbacconfigs.rbac.istio.io.yaml | 22 - ...rcedefinition_deniers.config.istio.io.yaml | 24 - ..._destinationrules.networking.istio.io.yaml | 37 - ...definition_dogstatsds.config.istio.io.yaml | 21 - ...ourcedefinition_edges.config.istio.io.yaml | 24 - ...tion_envoyfilters.networking.istio.io.yaml | 22 - ...cedefinition_fluentds.config.istio.io.yaml | 24 - ...finition_gateways.networking.istio.io.yaml | 24 - ...cedefinition_handlers.config.istio.io.yaml | 24 - ...n_httpapispecbindings.config.istio.io.yaml | 22 - ...finition_httpapispecs.config.istio.io.yaml | 22 - ...edefinition_instances.config.istio.io.yaml | 24 - ...definition_issuers.certmanager.k8s.io.yaml | 18 - ...nition_kubernetesenvs.config.istio.io.yaml | 24 - ...finition_kuberneteses.config.istio.io.yaml | 24 - ...finition_listcheckers.config.istio.io.yaml | 24 - ...efinition_listentries.config.istio.io.yaml | 24 - ...definition_logentries.config.istio.io.yaml | 45 - ...edefinition_memquotas.config.istio.io.yaml | 24 - ..._meshpolicies.authentication.istio.io.yaml | 23 - ...rcedefinition_metrics.config.istio.io.yaml | 24 - ...ourcedefinition_noops.config.istio.io.yaml | 24 - ...sourcedefinition_opas.config.istio.io.yaml | 24 - ...edefinition_orders.certmanager.k8s.io.yaml | 37 - ...tion_policies.authentication.istio.io.yaml | 22 - ...finition_prometheuses.config.istio.io.yaml | 24 - ...urcedefinition_quotas.config.istio.io.yaml | 24 - ...ion_quotaspecbindings.config.istio.io.yaml | 22 - ...definition_quotaspecs.config.istio.io.yaml | 22 - ...edefinition_rbacconfigs.rbac.istio.io.yaml | 24 - ...ourcedefinition_rbacs.config.istio.io.yaml | 24 - ...efinition_redisquotas.config.istio.io.yaml | 21 - ...nition_reportnothings.config.istio.io.yaml | 24 - ...ourcedefinition_rules.config.istio.io.yaml | 24 - ...on_serviceentries.networking.istio.io.yaml | 46 - ...ion_servicerolebindings.rbac.istio.io.yaml | 36 - ...definition_serviceroles.rbac.istio.io.yaml | 24 - ...finition_sidecars.networking.istio.io.yaml | 22 - ...edefinition_signalfxs.config.istio.io.yaml | 24 - ...finition_solarwindses.config.istio.io.yaml | 24 - ...finition_stackdrivers.config.istio.io.yaml | 24 - ...rcedefinition_statsds.config.istio.io.yaml | 24 - ...urcedefinition_stdios.config.istio.io.yaml | 24 - ...edefinition_templates.config.istio.io.yaml | 24 - ...definition_tracespans.config.istio.io.yaml | 24 - ...n_virtualservices.networking.istio.io.yaml | 41 - ...rcedefinition_zipkins.config.istio.io.yaml | 21 - .../istio-install/kustomize_test.go | 15 - ...kconfiguration_istio-sidecar-injector.yaml | 30 - .../expected/apps_v1_deployment_grafana.yaml | 152 - .../apps_v1_deployment_istio-citadel.yaml | 90 - ...pps_v1_deployment_istio-egressgateway.yaml | 171 - .../apps_v1_deployment_istio-galley.yaml | 133 - ...ps_v1_deployment_istio-ingressgateway.yaml | 177 - .../apps_v1_deployment_istio-pilot.yaml | 175 - .../apps_v1_deployment_istio-policy.yaml | 168 - ..._v1_deployment_istio-sidecar-injector.yaml | 125 - .../apps_v1_deployment_istio-telemetry.yaml | 172 - .../apps_v1_deployment_istio-tracing.yaml | 99 - .../expected/apps_v1_deployment_kiali.yaml | 97 - .../apps_v1_deployment_prometheus.yaml | 93 - ...ntalpodautoscaler_istio-egressgateway.yaml | 22 - ...talpodautoscaler_istio-ingressgateway.yaml | 22 - ...1_horizontalpodautoscaler_istio-pilot.yaml | 22 - ..._horizontalpodautoscaler_istio-policy.yaml | 22 - ...rizontalpodautoscaler_istio-telemetry.yaml | 22 - ...ch_v1_job_istio-cleanup-secrets-1.1.6.yaml | 72 - ..._job_istio-grafana-post-install-1.1.6.yaml | 72 - ...job_istio-security-post-install-1.1.6.yaml | 73 - ...v1alpha2_attributemanifest_istioproxy.yaml | 138 - ...v1alpha2_attributemanifest_kubernetes.yaml | 64 - ...tio.io_v1alpha2_handler_kubernetesenv.yaml | 13 - ....istio.io_v1alpha2_handler_prometheus.yaml | 216 - ...onfig.istio.io_v1alpha2_handler_stdio.yaml | 14 - ...tio.io_v1alpha2_kubernetes_attributes.yaml | 37 - ....istio.io_v1alpha2_logentry_accesslog.yaml | 58 - ...tio.io_v1alpha2_logentry_tcpaccesslog.yaml | 43 - ...istio.io_v1alpha2_metric_requestcount.yaml | 36 - ...io.io_v1alpha2_metric_requestduration.yaml | 36 - ....istio.io_v1alpha2_metric_requestsize.yaml | 36 - ...istio.io_v1alpha2_metric_responsesize.yaml | 36 - ...io.io_v1alpha2_metric_tcpbytereceived.yaml | 32 - ....istio.io_v1alpha2_metric_tcpbytesent.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsclosed.yaml | 32 - ..._v1alpha2_metric_tcpconnectionsopened.yaml | 32 - ....io_v1alpha2_rule_kubeattrgenrulerule.yaml | 15 - ...onfig.istio.io_v1alpha2_rule_promhttp.yaml | 20 - ...config.istio.io_v1alpha2_rule_promtcp.yaml | 17 - ...v1alpha2_rule_promtcpconnectionclosed.yaml | 16 - ...o_v1alpha2_rule_promtcpconnectionopen.yaml | 16 - .../config.istio.io_v1alpha2_rule_stdio.yaml | 16 - ...onfig.istio.io_v1alpha2_rule_stdiotcp.yaml | 16 - ..._v1alpha2_rule_tcpkubeattrgenrulerule.yaml | 16 - ...v1alpha3_destinationrule_istio-policy.yaml | 17 - ...lpha3_destinationrule_istio-telemetry.yaml | 17 - ...ddisruptionbudget_istio-egressgateway.yaml | 18 - ...eta1_poddisruptionbudget_istio-galley.yaml | 18 - ...disruptionbudget_istio-ingressgateway.yaml | 18 - ...beta1_poddisruptionbudget_istio-pilot.yaml | 18 - ...eta1_poddisruptionbudget_istio-policy.yaml | 21 - ...1_poddisruptionbudget_istio-telemetry.yaml | 21 - ...lusterrole_istio-citadel-istio-system.yaml | 44 - ...le_istio-cleanup-secrets-istio-system.yaml | 21 - ...role_istio-egressgateway-istio-system.yaml | 21 - ...clusterrole_istio-galley-istio-system.yaml | 85 - ...tio-grafana-post-install-istio-system.yaml | 16 - ...ole_istio-ingressgateway-istio-system.yaml | 21 - ..._clusterrole_istio-mixer-istio-system.yaml | 51 - ..._clusterrole_istio-pilot-istio-system.yaml | 73 - ...on.k8s.io_v1_clusterrole_istio-reader.yaml | 26 - ...e_istio-sidecar-injector-istio-system.yaml | 28 - ...on.k8s.io_v1_clusterrole_kiali-viewer.yaml | 124 - ...orization.k8s.io_v1_clusterrole_kiali.yaml | 134 - ...1_clusterrole_prometheus-istio-system.yaml | 32 - ...olebinding_istio-citadel-istio-system.yaml | 17 - ...ng_istio-cleanup-secrets-istio-system.yaml | 21 - ...ding_istio-egressgateway-istio-system.yaml | 17 - ...alley-admin-role-binding-istio-system.yaml | 17 - ...ost-install-role-binding-istio-system.yaml | 17 - ...ing_istio-ingressgateway-istio-system.yaml | 17 - ...kiali-admin-role-binding-istio-system.yaml | 17 - ...mixer-admin-role-binding-istio-system.yaml | 17 - ....io_v1_clusterrolebinding_istio-multi.yaml | 14 - ...rrolebinding_istio-pilot-istio-system.yaml | 17 - ...ector-admin-role-binding-istio-system.yaml | 18 - ...errolebinding_prometheus-istio-system.yaml | 17 - ...s.io_v1_role_istio-ingressgateway-sds.yaml | 14 - ..._rolebinding_istio-ingressgateway-sds.yaml | 13 - ...io-security-post-install-istio-system.yaml | 38 - ...ost-install-role-binding-istio-system.yaml | 17 - ..._configmap_istio-galley-configuration.yaml | 123 - ...iguration-dashboards-galley-dashboard.yaml | 341 - ...ation-dashboards-istio-mesh-dashboard.yaml | 229 - ...ashboards-istio-performance-dashboard.yaml | 150 - ...on-dashboards-istio-service-dashboard.yaml | 795 -- ...n-dashboards-istio-workload-dashboard.yaml | 744 -- ...figuration-dashboards-mixer-dashboard.yaml | 359 - ...figuration-dashboards-pilot-dashboard.yaml | 307 - ...figmap_istio-grafana-custom-resources.yaml | 59 - .../~g_v1_configmap_istio-grafana.yaml | 34 - ...igmap_istio-security-custom-resources.yaml | 58 - ...g_v1_configmap_istio-sidecar-injector.yaml | 102 - .../expected/~g_v1_configmap_istio.yaml | 77 - .../expected/~g_v1_configmap_kiali.yaml | 14 - .../expected/~g_v1_configmap_prometheus.yaml | 313 - .../~g_v1_namespace_istio-system.yaml | 6 - .../expected/~g_v1_secret_kiali.yaml | 14 - .../expected/~g_v1_service_grafana.yaml | 19 - .../expected/~g_v1_service_istio-citadel.yaml | 21 - .../~g_v1_service_istio-egressgateway.yaml | 25 - .../expected/~g_v1_service_istio-galley.yaml | 21 - .../~g_v1_service_istio-ingressgateway.yaml | 48 - .../expected/~g_v1_service_istio-pilot.yaml | 23 - .../expected/~g_v1_service_istio-policy.yaml | 24 - .../~g_v1_service_istio-sidecar-injector.yaml | 16 - .../~g_v1_service_istio-telemetry.yaml | 26 - .../expected/~g_v1_service_jaeger-agent.yaml | 28 - .../~g_v1_service_jaeger-collector.yaml | 24 - .../expected/~g_v1_service_jaeger-query.yaml | 19 - .../expected/~g_v1_service_kiali.yaml | 17 - .../expected/~g_v1_service_prometheus.yaml | 19 - .../expected/~g_v1_service_tracing.yaml | 19 - .../expected/~g_v1_service_zipkin.yaml | 19 - ...account_istio-citadel-service-account.yaml | 10 - ...istio-cleanup-secrets-service-account.yaml | 14 - ...t_istio-egressgateway-service-account.yaml | 10 - ...eaccount_istio-galley-service-account.yaml | 10 - ...nt_istio-grafana-post-install-account.yaml | 10 - ..._istio-ingressgateway-service-account.yaml | 10 - ...ceaccount_istio-mixer-service-account.yaml | 10 - .../~g_v1_serviceaccount_istio-multi.yaml | 5 - ...ceaccount_istio-pilot-service-account.yaml | 10 - ...t_istio-security-post-install-account.yaml | 10 - ...stio-sidecar-injector-service-account.yaml | 11 - ..._serviceaccount_kiali-service-account.yaml | 10 - .../~g_v1_serviceaccount_prometheus.yaml | 10 - .../istio/kustomize_test.go | 15 - ....io_v1alpha3_gateway_kubeflow-gateway.yaml | 15 - ...1alpha3_serviceentry_google-api-entry.yaml | 14 - ...serviceentry_google-storage-api-entry.yaml | 14 - ...v1alpha3_virtualservice_google-api-vs.yaml | 19 - ..._virtualservice_google-storage-api-vs.yaml | 19 - ...io_v1alpha3_virtualservice_grafana-vs.yaml | 23 - ...o_v1_clusterrole_kubeflow-istio-admin.yaml | 11 - ...io_v1_clusterrole_kubeflow-istio-edit.yaml | 22 - ...io_v1_clusterrole_kubeflow-istio-view.yaml | 16 - ...io_v1alpha1_clusterrbacconfig_default.yaml | 10 - ...configmap_istio-parameters-797cg68672.yaml | 10 - .../jupyter-web-app/kustomize_test.go | 15 - ...o_v1beta1_application_jupyter-web-app.yaml | 53 - ...deployment_jupyter-web-app-deployment.yaml | 69 - ...alpha3_virtualservice_jupyter-web-app.yaml | 32 - ...sterrole_jupyter-web-app-cluster-role.yaml | 63 - ...er-web-app-kubeflow-notebook-ui-admin.yaml | 15 - ...ter-web-app-kubeflow-notebook-ui-edit.yaml | 26 - ...ter-web-app-kubeflow-notebook-ui-view.yaml | 32 - ..._jupyter-web-app-cluster-role-binding.yaml | 21 - ...jupyter-web-app-jupyter-notebook-role.yaml | 45 - ...web-app-jupyter-notebook-role-binding.yaml | 21 - ...upyter-web-app-jupyter-web-app-config.yaml | 202 - ..._configmap_jupyter-web-app-parameters.yaml | 23 - ...~g_v1_service_jupyter-web-app-service.yaml | 41 - ...count_jupyter-web-app-service-account.yaml | 14 - .../katib-controller/kustomize_test.go | 15 - ..._v1beta1_application_katib-controller.yaml | 74 - .../apps_v1_deployment_katib-controller.yaml | 73 - .../apps_v1_deployment_katib-db-manager.yaml | 72 - .../apps_v1_deployment_katib-mysql.yaml | 88 - .../expected/apps_v1_deployment_katib-ui.yaml | 58 - ...o.io_v1alpha3_virtualservice_katib-ui.yaml | 28 - ...8s.io_v1_clusterrole_katib-controller.yaml | 96 - ...zation.k8s.io_v1_clusterrole_katib-ui.yaml | 27 - ...o_v1_clusterrole_kubeflow-katib-admin.yaml | 17 - ...io_v1_clusterrole_kubeflow-katib-edit.yaml | 29 - ...io_v1_clusterrole_kubeflow-katib-view.yaml | 23 - ...1_clusterrolebinding_katib-controller.yaml | 19 - ...k8s.io_v1_clusterrolebinding_katib-ui.yaml | 19 - .../~g_v1_configmap_katib-config.yaml | 70 - .../~g_v1_configmap_katib-parameters.yaml | 15 - .../~g_v1_configmap_trial-template.yaml | 81 - ..._v1_persistentvolumeclaim_katib-mysql.yaml | 18 - .../~g_v1_secret_katib-controller.yaml | 12 - .../~g_v1_secret_katib-mysql-secrets.yaml | 15 - .../~g_v1_service_katib-controller.yaml | 33 - .../~g_v1_service_katib-db-manager.yaml | 29 - .../expected/~g_v1_service_katib-mysql.yaml | 29 - .../expected/~g_v1_service_katib-ui.yaml | 30 - ...~g_v1_serviceaccount_katib-controller.yaml | 12 - .../~g_v1_serviceaccount_katib-ui.yaml | 12 - .../katib-crds/kustomize_test.go | 15 - ...cedefinition_experiments.kubeflow.org.yaml | 35 - ...cedefinition_suggestions.kubeflow.org.yaml | 41 - ...esourcedefinition_trials.kubeflow.org.yaml | 35 - ...k8s.io_v1beta1_application_katib-crds.yaml | 72 - .../kfserving-crds/kustomize_test.go | 15 - ...nferenceservices.serving.kubeflow.org.yaml | 6668 --------------- ...io_v1beta1_application_kfserving-crds.yaml | 39 - .../kfserving-install/kustomize_test.go | 15 - ...inferenceservice.serving.kubeflow.org.yaml | 56 - ...inferenceservice.serving.kubeflow.org.yaml | 34 - ....k8s.io_v1beta1_application_kfserving.yaml | 50 - ...tefulset_kfserving-controller-manager.yaml | 91 - ....io_v1alpha2_certificate_serving-cert.yaml | 21 - ....io_v1alpha2_issuer_selfsigned-issuer.yaml | 15 - ...o_v1_clusterrole_kfserving-proxy-role.yaml | 25 - ..._clusterrole_kubeflow-kfserving-admin.yaml | 18 - ...1_clusterrole_kubeflow-kfserving-edit.yaml | 28 - ...1_clusterrole_kubeflow-kfserving-view.yaml | 22 - ...on.k8s.io_v1_clusterrole_manager-role.yaml | 143 - ...lebinding_kfserving-proxy-rolebinding.yaml | 20 - ...lusterrolebinding_manager-rolebinding.yaml | 20 - ..._v1_configmap_inferenceservice-config.yaml | 113 - .../~g_v1_configmap_kfserving-config.yaml | 16 - ...ecret_kfserving-webhook-server-secret.yaml | 13 - ...ng-controller-manager-metrics-service.yaml | 34 - ..._kfserving-controller-manager-service.yaml | 28 - ...vice_kfserving-webhook-server-service.yaml | 26 - .../knative-crds/kustomize_test.go | 15 - ...cates.networking.internal.knative.dev.yaml | 31 - ...on_configurations.serving.knative.dev.yaml | 60 - ...n_images.caching.internal.knative.dev.yaml | 23 - ...esses.networking.internal.knative.dev.yaml | 35 - ...rics.autoscaling.internal.knative.dev.yaml | 29 - ...lers.autoscaling.internal.knative.dev.yaml | 41 - ...inition_revisions.serving.knative.dev.yaml | 61 - ...definition_routes.serving.knative.dev.yaml | 56 - ...vices.networking.internal.knative.dev.yaml | 46 - ...finition_services.serving.knative.dev.yaml | 64 - ...eta1_application_knative-serving-crds.yaml | 31 - .../~g_v1_namespace_knative-serving.yaml | 8 - .../knative-eventing-crds/kustomize_test.go | 15 - ..._apiserversources.sources.knative.dev.yaml | 66 - ...finition_brokers.eventing.knative.dev.yaml | 54 - ...nition_channels.messaging.knative.dev.yaml | 142 - ...agations.configs.internal.knative.dev.yaml | 47 - ..._containersources.sources.knative.dev.yaml | 46 - ...ition_eventtypes.eventing.knative.dev.yaml | 62 - ...nmemorychannels.messaging.knative.dev.yaml | 58 - ...efinition_parallels.flows.knative.dev.yaml | 55 - ...ition_pingsources.sources.knative.dev.yaml | 60 - ...efinition_sequences.flows.knative.dev.yaml | 55 - ...tion_sinkbindings.sources.knative.dev.yaml | 57 - ...n_subscriptions.messaging.knative.dev.yaml | 136 - ...inition_triggers.eventing.knative.dev.yaml | 169 - ...ta1_application_knative-eventing-crds.yaml | 31 - .../~g_v1_namespace_knative-eventing.yaml | 8 - .../kustomize_test.go | 15 - ...kbindings.webhook.sources.knative.dev.yaml | 19 - ...guration_webhook.eventing.knative.dev.yaml | 19 - ...n_config.webhook.eventing.knative.dev.yaml | 23 - ...lidation.webhook.eventing.knative.dev.yaml | 19 - ..._application_knative-eventing-install.yaml | 31 - .../apps_v1_deployment_broker-controller.yaml | 64 - ...pps_v1_deployment_eventing-controller.yaml | 60 - .../apps_v1_deployment_eventing-webhook.yaml | 62 - .../apps_v1_deployment_imc-controller.yaml | 52 - .../apps_v1_deployment_imc-dispatcher.yaml | 46 - ...o_v1_clusterrole_addressable-resolver.yaml | 14 - ...usterrole_broker-addressable-resolver.yaml | 20 - ...usterrole_builtin-podspecable-binding.yaml | 30 - ...sterrole_channel-addressable-resolver.yaml | 26 - ...1_clusterrole_channelable-manipulator.yaml | 14 - ...v1_clusterrole_eventing-broker-filter.yaml | 27 - ...1_clusterrole_eventing-broker-ingress.yaml | 18 - ...v1_clusterrole_eventing-config-reader.yaml | 18 - ...role_eventing-sources-source-observer.yaml | 22 - ...lusterrole_flows-addressable-resolver.yaml | 22 - ..._clusterrole_imc-addressable-resolver.yaml | 20 - ...usterrole_imc-channelable-manipulator.yaml | 23 - ....k8s.io_v1_clusterrole_imc-controller.yaml | 102 - ....k8s.io_v1_clusterrole_imc-dispatcher.yaml | 51 - ...ve-eventing-channel-broker-controller.yaml | 47 - ...usterrole_knative-eventing-controller.yaml | 133 - ...lusterrole_knative-eventing-jobrunner.yaml | 41 - ...ole_knative-eventing-namespaced-admin.yaml | 17 - ...role_knative-eventing-namespaced-edit.yaml | 22 - ...role_knative-eventing-namespaced-view.yaml | 22 - ...e_knative-eventing-sources-controller.yaml | 101 - ..._clusterrole_knative-eventing-webhook.yaml | 79 - ...errole_knative-flows-namespaced-admin.yaml | 17 - ...le_knative-messaging-namespaced-admin.yaml | 17 - ...role_knative-sources-namespaced-admin.yaml | 17 - ...errole_messaging-addressable-resolver.yaml | 22 - ...io_v1_clusterrole_podspecable-binding.yaml | 14 - ...sterrole_service-addressable-resolver.yaml | 19 - ...sterrole_serving-addressable-resolver.yaml | 22 - ...k8s.io_v1_clusterrole_source-observer.yaml | 14 - ...ng_eventing-channel-broker-controller.yaml | 17 - ...nding_eventing-controller-manipulator.yaml | 17 - ...ebinding_eventing-controller-resolver.yaml | 17 - ...g_eventing-controller-source-observer.yaml | 17 - ...venting-controller-sources-controller.yaml | 17 - ...lusterrolebinding_eventing-controller.yaml | 17 - ..._eventing-webhook-podspecable-binding.yaml | 17 - ...rolebinding_eventing-webhook-resolver.yaml | 17 - ...1_clusterrolebinding_eventing-webhook.yaml | 17 - ..._v1_clusterrolebinding_imc-controller.yaml | 17 - ..._v1_clusterrolebinding_imc-dispatcher.yaml | 17 - ...usterrolebinding_pingsource-jobrunner.yaml | 17 - ...1_configmap_config-br-default-channel.yaml | 14 - .../~g_v1_configmap_config-br-defaults.yaml | 18 - ...configmap_config-imc-event-dispatcher.yaml | 13 - ...g_v1_configmap_config-leader-election.yaml | 56 - .../~g_v1_configmap_config-logging.yaml | 36 - .../~g_v1_configmap_config-observability.yaml | 56 - .../~g_v1_configmap_config-tracing.yaml | 46 - .../~g_v1_configmap_default-ch-webhook.yaml | 19 - .../~g_v1_secret_eventing-webhook-certs.yaml | 10 - .../expected/~g_v1_service_broker-filter.yaml | 26 - .../~g_v1_service_broker-ingress.yaml | 26 - .../~g_v1_service_eventing-webhook.yaml | 21 - .../~g_v1_service_imc-dispatcher.yaml | 24 - ...v1_serviceaccount_eventing-controller.yaml | 10 - ...~g_v1_serviceaccount_eventing-webhook.yaml | 10 - .../~g_v1_serviceaccount_imc-controller.yaml | 10 - .../~g_v1_serviceaccount_imc-dispatcher.yaml | 10 - ...1_serviceaccount_pingsource-jobrunner.yaml | 10 - .../knative-install/kustomize_test.go | 15 - ...istio.networking.internal.knative.dev.yaml | 23 - ...iguration_webhook.serving.knative.dev.yaml | 19 - ...istio.networking.internal.knative.dev.yaml | 23 - ...on_config.webhook.serving.knative.dev.yaml | 23 - ...alidation.webhook.serving.knative.dev.yaml | 19 - ...1_application_knative-serving-install.yaml | 31 - .../apps_v1_deployment_activator.yaml | 86 - .../apps_v1_deployment_autoscaler.yaml | 77 - .../apps_v1_deployment_controller.yaml | 57 - .../apps_v1_deployment_istio-webhook.yaml | 63 - .../apps_v1_deployment_networking-istio.yaml | 59 - .../expected/apps_v1_deployment_webhook.yaml | 61 - ...ta1_horizontalpodautoscaler_activator.yaml | 22 - ...native.dev_v1alpha1_image_queue-proxy.yaml | 12 - ...1alpha3_gateway_cluster-local-gateway.yaml | 21 - ..._knative-serving-addressable-resolver.yaml | 22 - ..._v1_clusterrole_knative-serving-admin.yaml | 14 - ...o_v1_clusterrole_knative-serving-core.yaml | 128 - ..._v1_clusterrole_knative-serving-istio.yaml | 25 - ...role_knative-serving-namespaced-admin.yaml | 20 - ...rrole_knative-serving-namespaced-edit.yaml | 23 - ...rrole_knative-serving-namespaced-view.yaml | 22 - ...e_knative-serving-podspecable-binding.yaml | 20 - ...ding_knative-serving-controller-admin.yaml | 17 - ...alpha1_servicerole_istio-service-role.yaml | 15 - ...olebinding_istio-service-role-binding.yaml | 15 - .../~g_v1_configmap_config-autoscaler.yaml | 149 - .../~g_v1_configmap_config-defaults.yaml | 81 - .../~g_v1_configmap_config-deployment.yaml | 30 - .../~g_v1_configmap_config-domain.yaml | 47 - .../expected/~g_v1_configmap_config-gc.yaml | 43 - .../~g_v1_configmap_config-istio.yaml | 59 - ...g_v1_configmap_config-leader-election.yaml | 57 - .../~g_v1_configmap_config-logging.yaml | 63 - .../~g_v1_configmap_config-network.yaml | 94 - .../~g_v1_configmap_config-observability.yaml | 27 - .../~g_v1_configmap_config-tracing.yaml | 45 - .../~g_v1_secret_istio-webhook-certs.yaml | 10 - .../expected/~g_v1_secret_webhook-certs.yaml | 10 - .../~g_v1_service_activator-service.yaml | 31 - .../expected/~g_v1_service_autoscaler.yaml | 30 - .../expected/~g_v1_service_controller.yaml | 24 - .../expected/~g_v1_service_istio-webhook.yaml | 27 - .../expected/~g_v1_service_webhook.yaml | 27 - .../~g_v1_serviceaccount_controller.yaml | 10 - .../kubeflow-roles/kustomize_test.go | 15 - ....k8s.io_v1_clusterrole_kubeflow-admin.yaml | 9 - ...n.k8s.io_v1_clusterrole_kubeflow-edit.yaml | 11 - ...clusterrole_kubeflow-kubernetes-admin.yaml | 27 - ..._clusterrole_kubeflow-kubernetes-edit.yaml | 135 - ..._clusterrole_kubeflow-kubernetes-view.yaml | 125 - ...n.k8s.io_v1_clusterrole_kubeflow-view.yaml | 11 - .../metacontroller/kustomize_test.go | 15 - ...sitecontrollers.metacontroller.k8s.io.yaml | 17 - ...rollerrevisions.metacontroller.k8s.io.yaml | 14 - ...atorcontrollers.metacontroller.k8s.io.yaml | 17 - .../apps_v1_statefulset_metacontroller.yaml | 46 - ..._meta-controller-cluster-role-binding.yaml | 14 - ...erviceaccount_meta-controller-service.yaml | 7 - .../metadata/kustomize_test.go | 15 - ...p.k8s.io_v1beta1_application_metadata.yaml | 49 - .../apps_v1_deployment_metadata-db.yaml | 73 - ..._deployment_metadata-envoy-deployment.yaml | 48 - ...1_deployment_metadata-grpc-deployment.yaml | 62 - ...v1alpha3_virtualservice_metadata-grpc.yaml | 30 - ..._v1_configmap_metadata-grpc-configmap.yaml | 17 - ...g_v1_configmap_metadata-ui-parameters.yaml | 16 - ..._persistentvolumeclaim_metadata-mysql.yaml | 19 - .../expected/~g_v1_service_metadata-db.yaml | 29 - .../~g_v1_service_metadata-envoy-service.yaml | 29 - .../~g_v1_service_metadata-grpc-service.yaml | 29 - .../notebook-controller/kustomize_test.go | 15 - ...urcedefinition_notebooks.kubeflow.org.yaml | 100 - ...beta1_application_notebook-controller.yaml | 46 - ...oyment_notebook-controller-deployment.yaml | 57 - ...k-controller-kubeflow-notebooks-admin.yaml | 19 - ...ok-controller-kubeflow-notebooks-edit.yaml | 30 - ...ok-controller-kubeflow-notebooks-view.yaml | 24 - ..._clusterrole_notebook-controller-role.yaml | 58 - ...ding_notebook-controller-role-binding.yaml | 21 - ...figmap_notebook-controller-parameters.yaml | 19 - ...1_service_notebook-controller-service.yaml | 26 - ...t_notebook-controller-service-account.yaml | 14 - .../persistent-agent/kustomize_test.go | 15 - ..._v1beta1_application_persistent-agent.yaml | 39 - ...ployment_ml-pipeline-persistenceagent.yaml | 46 - ...sterrole_ml-pipeline-persistenceagent.yaml | 29 - ...ebinding_ml-pipeline-persistenceagent.yaml | 20 - ...eaccount_ml-pipeline-persistenceagent.yaml | 13 - .../kustomize_test.go | 15 - ...cation_pipeline-visualization-service.yaml | 39 - ...yment_ml-pipeline-visualizationserver.yaml | 42 - ...rvice_ml-pipeline-visualizationserver.yaml | 27 - .../pipelines-runner/kustomize_test.go | 15 - ..._v1beta1_application_pipelines-runner.yaml | 39 - ...o_v1beta1_clusterrole_pipeline-runner.yaml | 101 - ...a1_clusterrolebinding_pipeline-runner.yaml | 20 - .../~g_v1_serviceaccount_pipeline-runner.yaml | 13 - .../pipelines-ui/kustomize_test.go | 15 - ...s.io_v1beta1_application_pipelines-ui.yaml | 39 - .../apps_v1_deployment_ml-pipeline-ui.yaml | 64 - ...ualservice_ml-pipeline-tensorboard-ui.yaml | 29 - ...1alpha3_virtualservice_ml-pipeline-ui.yaml | 29 - ...on.k8s.io_v1beta1_role_ml-pipeline-ui.yaml | 33 - ...io_v1beta1_rolebinding_ml-pipeline-ui.yaml | 21 - ...v1_configmap_ui-parameters-hb792fcf5d.yaml | 15 - ...v1_service_ml-pipeline-tensorboard-ui.yaml | 25 - .../~g_v1_service_ml-pipeline-ui.yaml | 25 - .../~g_v1_serviceaccount_ml-pipeline-ui.yaml | 12 - .../pipelines-viewer/kustomize_test.go | 15 - ...sourcedefinition_viewers.kubeflow.org.yaml | 26 - ..._v1beta1_application_pipelines-viewer.yaml | 39 - ...pipeline-viewer-controller-deployment.yaml | 46 - ...iewer-kubeflow-pipeline-viewers-admin.yaml | 18 - ...viewer-kubeflow-pipeline-viewers-edit.yaml | 28 - ...viewer-kubeflow-pipeline-viewers-view.yaml | 22 - ...le_ml-pipeline-viewer-controller-role.yaml | 38 - ...g_ml-pipeline-viewer-crd-role-binding.yaml | 20 - ...l-pipeline-viewer-crd-service-account.yaml | 13 - .../profiles/kustomize_test.go | 15 - ...ourcedefinition_profiles.kubeflow.org.yaml | 164 - ...p.k8s.io_v1beta1_application_profiles.yaml | 45 - ...pps_v1_deployment_profiles-deployment.yaml | 83 - ...istio.io_v1alpha3_virtualservice_kfam.yaml | 32 - ...binding_profiles-cluster-role-binding.yaml | 20 - ...ofiles-profiles-parameters-c529d7fg88.yaml | 19 - .../expected/~g_v1_service_profiles-kfam.yaml | 24 - ...t_profiles-controller-service-account.yaml | 13 - .../pytorch-job-crds/kustomize_test.go | 15 - ...cedefinition_pytorchjobs.kubeflow.org.yaml | 49 - ..._v1beta1_application_pytorch-job-crds.yaml | 50 - .../pytorch-operator/kustomize_test.go | 15 - ..._v1beta1_application_pytorch-operator.yaml | 53 - .../apps_v1_deployment_pytorch-operator.yaml | 57 - ...lusterrole_kubeflow-pytorchjobs-admin.yaml | 18 - ...clusterrole_kubeflow-pytorchjobs-edit.yaml | 30 - ...clusterrole_kubeflow-pytorchjobs-view.yaml | 24 - ..._v1beta1_clusterrole_pytorch-operator.yaml | 37 - ...1_clusterrolebinding_pytorch-operator.yaml | 21 - .../~g_v1_service_pytorch-operator.yaml | 33 - ...~g_v1_serviceaccount_pytorch-operator.yaml | 14 - .../scheduledworkflow/kustomize_test.go | 15 - ...ition_scheduledworkflows.kubeflow.org.yaml | 26 - ...v1beta1_application_scheduledworkflow.yaml | 39 - ...loyment_ml-pipeline-scheduledworkflow.yaml | 46 - ...ole_kubeflow-scheduledworkflows-admin.yaml | 18 - ...role_kubeflow-scheduledworkflows-edit.yaml | 28 - ...role_kubeflow-scheduledworkflows-view.yaml | 22 - ...binding_ml-pipeline-scheduledworkflow.yaml | 20 - ...a1_role_ml-pipeline-scheduledworkflow.yaml | 38 - ...account_ml-pipeline-scheduledworkflow.yaml | 13 - .../seldon-core-operator/kustomize_test.go | 15 - ...tating-webhook-configuration-kubeflow.yaml | 88 - ...dating-webhook-configuration-kubeflow.yaml | 88 - ...deployments.machinelearning.seldon.io.yaml | 7198 ----------------- ...eta1_application_seldon-core-operator.yaml | 50 - ..._deployment_seldon-controller-manager.yaml | 186 - ...lpha2_certificate_seldon-serving-cert.yaml | 22 - ...lpha2_issuer_seldon-selfsigned-issuer.yaml | 15 - ...sterrole_seldon-manager-role-kubeflow.yaml | 229 - ...role_seldon-manager-sas-role-kubeflow.yaml | 38 - ...g_seldon-manager-rolebinding-kubeflow.yaml | 20 - ...ldon-manager-sas-rolebinding-kubeflow.yaml | 20 - ...o_v1_role_seldon-leader-election-role.yaml | 40 - ...ng_seldon-leader-election-rolebinding.yaml | 21 - .../~g_v1_configmap_seldon-config.yaml | 19 - .../~g_v1_service_seldon-webhook-service.yaml | 26 - .../~g_v1_serviceaccount_seldon-manager.yaml | 13 - .../spark-operator/kustomize_test.go | 15 - ...parkapplications.sparkoperator.k8s.io.yaml | 2554 ------ ...parkapplications.sparkoperator.k8s.io.yaml | 2536 ------ ...io_v1beta1_application_spark-operator.yaml | 46 - ...eployment_spark-operatorsparkoperator.yaml | 61 - ...clusterrole_spark-operatoroperator-cr.yaml | 80 - ...nding_spark-operatorsparkoperator-crb.yaml | 20 - ...s.io_v1_role_spark-operatorspark-role.yaml | 27 - ...ding_spark-operatorspark-role-binding.yaml | 21 - ...viceaccount_spark-operatoroperator-sa.yaml | 13 - ...v1_serviceaccount_spark-operatorspark.yaml | 13 - .../spartakus/kustomize_test.go | 15 - ....k8s.io_v1beta1_application_spartakus.yaml | 41 - ...pps_v1_deployment_spartakus-volunteer.yaml | 53 - ....k8s.io_v1beta1_clusterrole_spartakus.yaml | 21 - ..._v1beta1_clusterrolebinding_spartakus.yaml | 21 - .../~g_v1_configmap_spartakus-config.yaml | 16 - .../~g_v1_serviceaccount_spartakus.yaml | 14 - .../tf-job-crds/kustomize_test.go | 15 - ...esourcedefinition_tfjobs.kubeflow.org.yaml | 54 - ...8s.io_v1beta1_application_tf-job-crds.yaml | 50 - .../tf-job-operator/kustomize_test.go | 15 - ...o_v1beta1_application_tf-job-operator.yaml | 51 - .../apps_v1_deployment_tf-job-operator.yaml | 55 - ..._v1_clusterrole_kubeflow-tfjobs-admin.yaml | 18 - ...o_v1_clusterrole_kubeflow-tfjobs-edit.yaml | 29 - ...o_v1_clusterrole_kubeflow-tfjobs-view.yaml | 23 - ...o_v1beta1_clusterrole_tf-job-operator.yaml | 44 - ...a1_clusterrolebinding_tf-job-operator.yaml | 21 - .../~g_v1_service_tf-job-operator.yaml | 33 - ...~g_v1_serviceaccount_tf-job-dashboard.yaml | 14 - .../~g_v1_serviceaccount_tf-job-operator.yaml | 14 - .../webhook/kustomize_test.go | 15 - ...ebhook-mutating-webhook-configuration.yaml | 33 - ...cedefinition_poddefaults.kubeflow.org.yaml | 60 - ...pp.k8s.io_v1beta1_application_webhook.yaml | 45 - ...ployment_admission-webhook-deployment.yaml | 51 - ...errole_admission-webhook-cluster-role.yaml | 26 - ...on-webhook-kubeflow-poddefaults-admin.yaml | 19 - ...ion-webhook-kubeflow-poddefaults-edit.yaml | 19 - ...ion-webhook-kubeflow-poddefaults-view.yaml | 25 - ...dmission-webhook-cluster-role-binding.yaml | 21 - ...-webhook-admission-webhook-parameters.yaml | 17 - ..._v1_service_admission-webhook-service.yaml | 27 - ...unt_admission-webhook-service-account.yaml | 14 - tests/tools/fix_common_labels.go | 123 - tests/validate_resources_test.go | 555 -- 5765 files changed, 336817 deletions(-) delete mode 100755 tests/Makefile delete mode 100644 tests/README.md delete mode 100644 tests/doc.go delete mode 100644 tests/go.mod delete mode 100644 tests/go.sum delete mode 100644 tests/katib/installs/katib-external-db/kustomize_test.go delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-mysql-secrets-kmcg6hfkfg.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/kustomize_test.go delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/kustomize_test.go delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/legacy_kustomizations/api-service/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/application-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/application/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/application/params_0.env delete mode 100644 tests/legacy_kustomizations/argo/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/argo/params_0.env delete mode 100644 tests/legacy_kustomizations/bootstrap/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/bootstrap/params_0.env delete mode 100644 tests/legacy_kustomizations/centraldashboard/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/centraldashboard/params_0.env delete mode 100644 tests/legacy_kustomizations/cert-manager-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/cert-manager-kube-system-resources/params_0.env delete mode 100644 tests/legacy_kustomizations/cert-manager/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/cert-manager/params_0.env delete mode 100644 tests/legacy_kustomizations/cloud-endpoints/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/cloud-endpoints/params_0.env delete mode 100644 tests/legacy_kustomizations/default-install/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/default-install/params_0.env delete mode 100644 tests/legacy_kustomizations/gpu-driver/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/iap-ingress/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/iap-ingress/params_0.env delete mode 100644 tests/legacy_kustomizations/istio-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/istio-install/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/istio/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/istio/params_0.env delete mode 100644 tests/legacy_kustomizations/jupyter-web-app/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/jupyter-web-app/params_0.env delete mode 100644 tests/legacy_kustomizations/katib-controller/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/katib-controller/params_0.env delete mode 100644 tests/legacy_kustomizations/katib-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/kfserving-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/kfserving-install/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/kfserving-install/params_0.env delete mode 100644 tests/legacy_kustomizations/knative-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/knative-eventing-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/knative-eventing-install/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/knative-install/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/kubeflow-roles/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/metacontroller/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/metadata/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/metadata/params_0.env delete mode 100644 tests/legacy_kustomizations/metadata/params_1.env delete mode 100644 tests/legacy_kustomizations/notebook-controller/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/notebook-controller/params_0.env delete mode 100644 tests/legacy_kustomizations/persistent-agent/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/pipeline-visualization-service/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/pipelines-runner/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/pipelines-ui/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/pipelines-ui/params_0.env delete mode 100644 tests/legacy_kustomizations/pipelines-viewer/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/profiles/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/profiles/params_0.env delete mode 100644 tests/legacy_kustomizations/pytorch-job-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/pytorch-operator/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/scheduledworkflow/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/seldon-core-operator/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/spark-operator/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/spartakus/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/spartakus/params_0.env delete mode 100644 tests/legacy_kustomizations/tf-job-crds/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/tf-job-operator/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/webhook/kustomization.yaml delete mode 100644 tests/legacy_kustomizations/webhook/params_0.env delete mode 100644 tests/scripts/extract_images.py delete mode 100644 tests/scripts/requirements.txt delete mode 100755 tests/scripts/run-tests.sh delete mode 100644 tests/stacks/aws/application/cert-manager-crds/kustomize_test.go delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/kustomize_test.go delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/kustomize_test.go delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/kustomize_test.go delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/kustomize_test.go delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/kustomize_test.go delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml delete mode 100644 tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/kustomize_test.go delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-ingress-cognito/kustomize_test.go delete mode 100644 tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/networking.k8s.io_v1beta1_ingress_istio-ingress.yaml delete mode 100644 tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/~g_v1_configmap_istio-ingress-config.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/kustomize_test.go delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml delete mode 100644 tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/aws/application/istio/kustomize_test.go delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/stacks/aws/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/kustomize_test.go delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/kustomize_test.go delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml delete mode 100644 tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml delete mode 100644 tests/stacks/aws/application/spartakus/kustomize_test.go delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/stacks/aws/kustomize_test.go delete mode 100644 tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-alb-ingress-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-nvidia-device-plugin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_daemonset_nvidia-device-plugin-daemonset.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_alb-ingress-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_mpi-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_mxnet-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/aws/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml delete mode 100644 tests/stacks/aws/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_alb-ingress-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_alb-ingress-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_aws-alb-ingress-controller-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/kustomize_test.go delete mode 100644 tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/kustomize_test.go delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/kustomize_test.go delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/kustomize_test.go delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/kustomize_test.go delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/azure/application/istio/kustomize_test.go delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/stacks/azure/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/kustomize_test.go delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/kustomize_test.go delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/kustomize_test.go delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml delete mode 100644 tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/kustomize_test.go delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml delete mode 100644 tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml delete mode 100644 tests/stacks/azure/application/spartakus/kustomize_test.go delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/stacks/azure/kustomize_test.go delete mode 100644 tests/stacks/azure/metadata/kustomize_test.go delete mode 100644 tests/stacks/azure/metadata/test_data/expected/default_apps_v1_deployment_deployment.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/default_~g_v1_configmap_metadata-db-parameters-hc59m6d49g.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/default_~g_v1_secret_metadata-db-secrets-c9d6622b8k.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_activator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_autoscaler.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_istio-webhook.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_mpi-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_mxnet-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_networking-istio.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_webhook.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml delete mode 100644 tests/stacks/azure/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml delete mode 100644 tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml delete mode 100644 tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml delete mode 100644 tests/stacks/azure/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml delete mode 100644 tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-autoscaler.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-defaults.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-deployment.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-domain.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-gc.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-istio.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-leader-election.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-logging.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-network.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-observability.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_config-tracing.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_namespace_knative-serving.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_secret_webhook-certs.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_activator-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_autoscaler.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_istio-webhook.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_service_webhook.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/kustomize_test.go delete mode 100644 tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-5cc2fchd2g.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-config-bmh8k74f52.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/kustomize_test.go delete mode 100644 tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-config-c644m77455.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/kustomize_test.go delete mode 100644 tests/stacks/generic/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/generic/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_kubeflow-config-988m2m9m87.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/add-anonymous-user-filter/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/ibm/application/argo/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml delete mode 100644 tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml delete mode 100644 tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml delete mode 100644 tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/ibm/application/istio/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/stacks/ibm/application/istio/test_data/expected/~g_v1_configmap_istio-config.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/ibm/application/katib/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-gg2h6k2fch.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/application/metadata/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/default_app.k8s.io_v1beta1_application_notebook-controller.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_configmap_notebook-controller-config.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/apps_v1_statefulset_authservice.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_virtualservice_authservice.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_service_authservice.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_serviceaccount_oidc-authservice-service-account.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-config.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml delete mode 100644 tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/profiles/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml delete mode 100644 tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/kustomize_test.go delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/base/kustomize_test.go delete mode 100644 tests/stacks/ibm/base/test_data/expected/~g_v1_configmap_kubeflow-config-d7dttg89h2.yaml delete mode 100644 tests/stacks/ibm/kustomize_test.go delete mode 100644 tests/stacks/ibm/multi-user/kustomize_test.go delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/application/add-anonymous-user-filter/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml delete mode 100644 tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/stacks/kubernetes/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml delete mode 100644 tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml delete mode 100644 tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/stacks/kubernetes/kustomize_test.go delete mode 100644 tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mpi-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mxnet-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-config.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/argo/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml delete mode 100644 tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml delete mode 100644 tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/stacks/openshift/application/istio/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/stacks/openshift/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-c7ckdh44mc.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/stacks/openshift/application/katib/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/openshift/application/metadata/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_serviceaccount_metadatadb.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-istio.yaml delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-privileged-istio.yaml delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_tekton-anyuid-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/~g_v1_configmap_scc-namespace-check.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-server.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_metadata-writer.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_minio.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_mysql.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_cache-server.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_minio-service.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_mysql.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/stacks/openshift/application/profiles/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/stacks/openshift/application/seldon/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/kustomize_test.go delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/stacks/openshift/kustomize_test.go delete mode 100644 tests/stacks/openshift/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/test_util.go delete mode 100644 tests/testdata_gcp_kpt/gcp/Kptfile delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/asm/istio-operator.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/cluster.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-policy.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-sa.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/nodepool.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/gcp-services.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/admin-manages-user-policy.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-policy.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-sa.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-workload-identity-bindings.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-policy.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-sa.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-workload-identity-bindings.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/compute-address.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/disk.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cluster/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cluster/cluster.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cluster/enable-services.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cluster/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cluster/nodepool.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/enable-services.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/iam.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/0-cnrm-system.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/crds.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/cluster-private-patch.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/compute-network.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-gcr.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-google-apis.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/enable-services.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/firewall.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomization.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/README.md delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/image_prefix.yaml delete mode 100644 tests/testdata_gcp_kpt/gcp/v2/privateGKE/nat.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/app.k8s.io_v1beta1_application_api-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/apps_v1_deployment_ml-pipeline.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_configmap_ml-pipeline-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_service_ml-pipeline.yaml delete mode 100644 tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml delete mode 100644 tests/tests/legacy_kustomizations/application-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/application-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_applications.app.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/app.k8s.io_v1beta1_application_kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/apps_v1_statefulset_application-controller-stateful-set.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_application-controller-cluster-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_application-controller-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_configmap_application-controller-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_service_application-controller-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_serviceaccount_application-controller-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_service_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml delete mode 100644 tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_configmap_parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudendpoints.ctl.isla.solutions.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/app.k8s.io_v1beta1_application_cloud-endpoints.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apps_v1_deployment_cloud-endpoints-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_cloud-endpoints-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cloud-endpoints-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cloud-endpoints-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_configmap_cloud-endpoints-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_service_cloud-endpoints-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/default-install/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/default-install/test_data/expected/kubeflow.org_v1beta1_profile_kubeflow-jlewi.yaml delete mode 100644 tests/tests/legacy_kustomizations/default-install/test_data/expected/~g_v1_configmap_default-install-config-6mcgbmmtg6.yaml delete mode 100644 tests/tests/legacy_kustomizations/gpu-driver/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/app.k8s.io_v1beta1_application_gpu-driver.yaml delete mode 100644 tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/apps_v1_daemonset_nvidia-driver-installer.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/app.k8s.io_v1beta1_application_iap-ingress.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_iap-enabler.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_whoami-app.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_statefulset_backend-updater.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/authentication.istio.io_v1alpha1_policy_ingress-jwt.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/cloud.google.com_v1beta1_backendconfig_iap-backendconfig.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/ctl.isla.solutions_v1_cloudendpoint_kf-v1-0210.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.gke.io_v1beta1_managedcertificate_gke-certificate.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.k8s.io_v1beta1_ingress_envoy-ingress.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_kf-admin-iap.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_kf-admin-iap.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_envoy-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_ingress-bootstrap-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_service_whoami-app.yaml delete mode 100644 tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_grafana.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-citadel.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-galley.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-pilot.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-policy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-telemetry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-tracing.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_kiali.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_prometheus.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_kiali.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_prometheus.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_namespace_istio-system.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_secret_kiali.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_grafana.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-citadel.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-egressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-galley.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-ingressgateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-pilot.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-policy.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-telemetry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-agent.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-collector.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-query.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_kiali.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_prometheus.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_tracing.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_zipkin.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_prometheus.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml delete mode 100644 tests/tests/legacy_kustomizations/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-db-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-mysql.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_trial-template.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-db-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-mysql.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/katib-crds/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/app.k8s.io_v1beta1_application_kfserving-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_manager-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_manager-rolebinding.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_kfserving-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-crds/test_data/expected/~g_v1_namespace_knative-serving.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apiserversources.sources.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_brokers.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_channels.messaging.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configmappropagations.configs.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_containersources.sources.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_eventtypes.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inmemorychannels.messaging.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_parallels.flows.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pingsources.sources.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sequences.flows.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sinkbindings.sources.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_subscriptions.messaging.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_triggers.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/~g_v1_namespace_knative-eventing.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_sinkbindings.webhook.sources.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.eventing.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-install.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_broker-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_broker-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_builtin-podspecable-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channel-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channelable-manipulator.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-filter.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-ingress.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-config-reader.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-sources-source-observer.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_flows-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-channelable-manipulator.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-channel-broker-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-jobrunner.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-sources-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-flows-namespaced-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-messaging-namespaced-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-sources-namespaced-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_messaging-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_podspecable-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_service-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_serving-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_source-observer.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-channel-broker-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-manipulator.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-source-observer.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-sources-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-podspecable-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_pingsource-jobrunner.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-default-channel.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-defaults.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-imc-event-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-logging.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-observability.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-tracing.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_default-ch-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_secret_eventing-webhook-certs.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-filter.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-ingress.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_eventing-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_imc-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-dispatcher.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_pingsource-jobrunner.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_activator.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_autoscaler.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_istio-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_networking-istio.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-autoscaler.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-defaults.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-domain.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-gc.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-istio.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-logging.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-network.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-observability.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-tracing.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_webhook-certs.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_activator-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_autoscaler.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_istio-webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_serviceaccount_controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_compositecontrollers.metacontroller.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_controllerrevisions.metacontroller.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_decoratorcontrollers.metacontroller.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apps_v1_statefulset_metacontroller.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_meta-controller-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/metacontroller/test_data/expected/~g_v1_serviceaccount_meta-controller-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-db.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/app.k8s.io_v1beta1_application_persistent-agent.yaml delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipeline-visualization-service/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/app.k8s.io_v1beta1_application_pipeline-visualization-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-runner/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/app.k8s.io_v1beta1_application_pipelines-runner.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pipeline-runner.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pipeline-runner.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/app.k8s.io_v1beta1_application_pipelines-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-tensorboard-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_configmap_ui-parameters-hb792fcf5d.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-tensorboard-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/app.k8s.io_v1beta1_application_pipelines-viewer.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-controller-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-viewer-controller-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-viewer-crd-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-parameters-c529d7fg88.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml delete mode 100644 tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-job-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/apps_v1_deployment_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_service_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/app.k8s.io_v1beta1_application_scheduledworkflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml delete mode 100644 tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml delete mode 100644 tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-crds/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/apps_v1_deployment_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_service_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml delete mode 100644 tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/kustomize_test.go delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml delete mode 100644 tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml delete mode 100644 tests/tools/fix_common_labels.go delete mode 100644 tests/validate_resources_test.go diff --git a/tests/Makefile b/tests/Makefile deleted file mode 100755 index 37bbbf2b41..0000000000 --- a/tests/Makefile +++ /dev/null @@ -1,72 +0,0 @@ -# Copyright 2017 The Kubernetes Authors. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. -# -GOLANG_VERSION ?= 1.12.4 -GOPATH ?= $(HOME)/go -PYTHON_BIN ?= python -export KUSTOMIZE_BIN ?= kustomize - -# Comma seperated items within {} for more than one file -# EXCLUDE ?= istio-install-base_test.go - -export GO111MODULE = on -export GO = go - -all: test - -# Reset various kpt values to default values -# TODO(jlewi): We should add a test to make sure changed values don't get checked in -# We don't run it in generate because we don't want to force all developers to install kpt -# TODO(jlewi): This ends up setting "isSet" to true for the setters in the KptFile. -# Does this prevent gcloud from automatically filling in the values zone and -# region? If so we may need to use yq to set that back to false. -gcp-reset: - kpt cfg set ../gcp/ gcloud.core.project project-id - kpt cfg set ../gcp/ gcloud.project.projectNumber projectNumber - kpt cfg set ../gcp/ gcloud.compute.zone ZONE - kpt cfg set ../gcp/ gcloud.compute.region REGION - kpt cfg set ../gcp/ name name - kpt cfg set ../gcp/ location location - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.gcloud.core.project"].["x-k8s-cli"].["setter"].["isSet"] - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.gcloud.project.projectNumber"].["x-k8s-cli"].["setter"].["isSet"] - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.gcloud.compute.zone"].["x-k8s-cli"].["setter"].["isSet"] - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.gcloud.compute.region"].["x-k8s-cli"].["setter"].["isSet"] - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.location"].["x-k8s-cli"].["setter"].["isSet"] - yq d -i ../gcp/Kptfile openAPI.definitions["io.k8s.cli.setters.name"].["x-k8s-cli"].["setter"].["isSet"] - -generate: - $(PYTHON_BIN) ../hack/generate_tests.py --all - $(GO) fmt ./... - -generate-changed-only: - $(PYTHON_BIN) ../hack/generate_tests.py - $(GO) fmt ./... - -modules: - @GO111MODULE=on $(GO) mod download - -test: modules - # Temporarily disable the autogenerated tests. Re-enable them once stacks - # are buildable again, before the release. In addition, evaluate if we need - # the legacy kustomizations tests. Perhaps a simpler sanity test of building - # all kustomizations in the repo would be preferrable. - # @GO111MODULE=on $(GO) test -v github.com/kubeflow/manifests/tests/... - @GO111MODULE=on $(GO) test -run TestCheckWebhookSelector -v github.com/kubeflow/manifests/tests/. - @GO111MODULE=on $(GO) test -run TestKustomizationHasDeprecatedEnv -v github.com/kubeflow/manifests/tests/. - -run-unittest-plugin: - cd .. && XDG_CONFIG_HOME=$$(pwd)/plugins kustomize build profiles/overlays/test --enable_alpha_plugins - -run-application-plugin: - cd .. && XDG_CONFIG_HOME=$$(pwd)/plugins kustomize build jupyter/jupyter-web-app/overlays/application --enable_alpha_plugins diff --git a/tests/README.md b/tests/README.md deleted file mode 100644 index 22c217d2bd..0000000000 --- a/tests/README.md +++ /dev/null @@ -1,30 +0,0 @@ -# Kustomize Manifest Tests - -## Unittests - -There are two goals for the unittests: - -1. Verify that kustomizations are applied correctly (kubeflow/manifests#1014) -1. Verify that various conventions are enforced (kubeflow/manifests#1015) - -### Verifying Kustomizations Are Applied Correctly - -Examples of kustomizations that we would like to verify are applied and generate the expected output - -* Patches -* Variable substitution -* Composition of resources - -The general approach to doing this is - -1. Check in one more "kustomization.yaml" files corresponding to test cases -1. Run "kustomize build -o ..." and check in the output as the expected test output - - * Reviewers can verify changes to the expected output to ensure changes have the desired effect on the expected output -1. Unittests run "kustomize build" and compare output to expected output to ensure kustomize packages are in sync with the expected output -1. Make commands make it easy to regenerate the expected output as part of a change. - - ``` - cd tests - make generate-changed-only - ``` \ No newline at end of file diff --git a/tests/doc.go b/tests/doc.go deleted file mode 100644 index 4f1fc49104..0000000000 --- a/tests/doc.go +++ /dev/null @@ -1,2 +0,0 @@ -// tests package contains unittests for kustomize manifests -package tests diff --git a/tests/go.mod b/tests/go.mod deleted file mode 100644 index e09c9257ca..0000000000 --- a/tests/go.mod +++ /dev/null @@ -1,76 +0,0 @@ -module github.com/kubeflow/manifests/tests - -go 1.13 - -require ( - github.com/PuerkitoBio/purell v1.1.1 // indirect - github.com/emicklei/go-restful v2.15.0+incompatible // indirect - github.com/evanphx/json-patch v4.9.0+incompatible // indirect - github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32 - github.com/go-openapi/jsonpointer v0.19.5 // indirect - github.com/go-openapi/jsonreference v0.19.5 // indirect - github.com/go-openapi/spec v0.20.0 // indirect - github.com/go-openapi/swag v0.19.12 // indirect - github.com/gogo/protobuf v1.3.2 // indirect - github.com/google/gofuzz v1.2.0 // indirect - github.com/google/martian v2.1.0+incompatible - github.com/googleapis/gnostic v0.5.3 // indirect - github.com/jessevdk/go-flags v1.4.0 // indirect - github.com/json-iterator/go v1.1.10 // indirect - github.com/kubernetes-sigs/kustomize v2.0.3+incompatible // indirect - github.com/mailru/easyjson v0.7.6 // indirect - github.com/pkg/errors v0.9.1 - github.com/spf13/cobra v1.1.1 // indirect - golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 // indirect - golang.org/x/net v0.0.0-20201224014010-6772e930b67b // indirect - golang.org/x/text v0.3.5 // indirect - google.golang.org/protobuf v1.25.0 // indirect - gopkg.in/yaml.v2 v2.4.0 // indirect - gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b - k8s.io/api v0.20.2 // indirect - k8s.io/apimachinery v0.20.2 - k8s.io/client-go v12.0.0+incompatible // indirect - k8s.io/klog v1.0.0 // indirect - k8s.io/kube-openapi v0.0.0-20210113233702-8566a335510f // indirect - sigs.k8s.io/kustomize v2.0.3+incompatible // indirect - sigs.k8s.io/kustomize/kyaml v0.1.11 - sigs.k8s.io/kustomize/v3 v3.2.0 - sigs.k8s.io/yaml v1.2.0 // indirect -) - -replace ( - git.apache.org/thrift.git => github.com/apache/thrift v0.0.0-20180902110319-2566ecd5d999 - github.com/Sirupsen/logrus => github.com/sirupsen/logrus v1.0.5 - github.com/go-openapi/jsonpointer => github.com/go-openapi/jsonpointer v0.17.0 - github.com/go-openapi/jsonreference => github.com/go-openapi/jsonreference v0.17.0 - github.com/go-openapi/spec => github.com/go-openapi/spec v0.18.0 - github.com/go-openapi/swag => github.com/go-openapi/swag v0.17.0 - github.com/mitchellh/go-homedir => github.com/mitchellh/go-homedir v1.0.0 - github.com/russross/blackfriday => github.com/russross/blackfriday v1.5.2-0.20180428102519-11635eb403ff // indirect - golang.org/x/crypto => golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9 - k8s.io/api => k8s.io/api v0.0.0-20190620084959-7cf5895f2711 - k8s.io/apiextensions-apiserver => k8s.io/apiextensions-apiserver v0.0.0-20190620085554-14e95df34f1f - k8s.io/apimachinery => k8s.io/apimachinery v0.0.0-20190612205821-1799e75a0719 - k8s.io/apiserver => k8s.io/apiserver v0.0.0-20190620085212-47dc9a115b18 - k8s.io/cli-runtime => k8s.io/cli-runtime v0.0.0-20190620085706-2090e6d8f84c - k8s.io/client-go => k8s.io/client-go v0.0.0-20190620085101-78d2af792bab - k8s.io/cloud-provider => k8s.io/cloud-provider v0.0.0-20190620090043-8301c0bda1f0 - k8s.io/cluster-bootstrap => k8s.io/cluster-bootstrap v0.0.0-20190620090013-c9a0fc045dc1 - k8s.io/code-generator => k8s.io/code-generator v0.0.0-20190612205613-18da4a14b22b - k8s.io/component-base => k8s.io/component-base v0.0.0-20190620085130-185d68e6e6ea - k8s.io/cri-api => k8s.io/cri-api v0.0.0-20190531030430-6117653b35f1 - k8s.io/csi-translation-lib => k8s.io/csi-translation-lib v0.0.0-20190620090116-299a7b270edc - k8s.io/kube-aggregator => k8s.io/kube-aggregator v0.0.0-20190620085325-f29e2b4a4f84 - k8s.io/kube-controller-manager => k8s.io/kube-controller-manager v0.0.0-20190620085942-b7f18460b210 - k8s.io/kube-proxy => k8s.io/kube-proxy v0.0.0-20190620085809-589f994ddf7f - k8s.io/kube-scheduler => k8s.io/kube-scheduler v0.0.0-20190620085912-4acac5405ec6 - k8s.io/kubectl => k8s.io/kubectl v0.0.0-20191016120415-2ed914427d51 - k8s.io/kubelet => k8s.io/kubelet v0.0.0-20190620085838-f1cb295a73c9 - k8s.io/kubernetes => k8s.io/kubernetes v1.15.0 - k8s.io/legacy-cloud-providers => k8s.io/legacy-cloud-providers v0.0.0-20190620090156-2138f2c9de18 - k8s.io/metrics => k8s.io/metrics v0.0.0-20190620085625-3b22d835f165 - k8s.io/sample-apiserver => k8s.io/sample-apiserver v0.0.0-20190620085408-1aef9010884e - sigs.k8s.io/application => sigs.k8s.io/application v0.0.0-20190404151855-67ae7f915d4e - sigs.k8s.io/controller-runtime => sigs.k8s.io/controller-runtime v0.2.0 - sigs.k8s.io/kustomize/v3 => sigs.k8s.io/kustomize/v3 v3.2.0 -) diff --git a/tests/go.sum b/tests/go.sum deleted file mode 100644 index e7487d107d..0000000000 --- a/tests/go.sum +++ /dev/null @@ -1,614 +0,0 @@ -cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= -cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= -cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU= -cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU= -cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY= -cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc= -cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0= -cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o= -cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE= -cloud.google.com/go/firestore v1.1.0/go.mod h1:ulACoGHTpvq5r8rxGJ4ddJZBZqakUQqClKRT5SZwBmk= -cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I= -cloud.google.com/go/storage v1.0.0/go.mod h1:IhtSnM/ZTZV8YYJWCY8RULGVqBDmpoyjwiyrjsg+URw= -dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= -github.com/360EntSecGroup-Skylar/excelize v1.4.1/go.mod h1:vnax29X2usfl7HHkBrX5EvSCJcmH3dT9luvxzu8iGAE= -github.com/Azure/go-autorest v11.1.2+incompatible/go.mod h1:r+4oMnoxhatjLLJ6zxSWATqVooLgysK6ZNox3g/xq24= -github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= -github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= -github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ= -github.com/OneOfOne/xxhash v1.2.2/go.mod h1:HSdplMjZKSmBqAxg5vPj2TmRDmfkzw+cTzAElWljhcU= -github.com/PuerkitoBio/goquery v1.5.0/go.mod h1:qD2PgZ9lccMbQlc7eEOjaeRlFQON7xY8kdmcsrnKqMg= -github.com/PuerkitoBio/purell v1.0.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= -github.com/PuerkitoBio/purell v1.1.0/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= -github.com/PuerkitoBio/purell v1.1.1 h1:WEQqlqaGbrPkxLJWfBwQmfEAE1Z7ONdDLqrN38tNFfI= -github.com/PuerkitoBio/purell v1.1.1/go.mod h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0= -github.com/PuerkitoBio/urlesc v0.0.0-20160726150825-5bd2802263f2/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE= -github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578 h1:d+Bc7a5rLufV/sSk/8dngufqelfh6jnri85riMAaF/M= -github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE= -github.com/agnivade/levenshtein v1.0.1/go.mod h1:CURSv5d9Uaml+FovSIICkLbAUZ9S4RqaHDIsdSBg7lM= -github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= -github.com/alecthomas/units v0.0.0-20151022065526-2efee857e7cf/go.mod h1:ybxpYRFXyAe+OPACYpWeL0wqObRcbAqCMya13uyzqw0= -github.com/andreyvit/diff v0.0.0-20170406064948-c7f18ee00883/go.mod h1:rCTlJbsFo29Kk6CurOXKm700vrz8f0KW0JNfpkRJY/8= -github.com/andybalholm/cascadia v1.0.0/go.mod h1:GsXiBklL0woXo1j/WYWtSYYC4ouU9PqHO0sqidkEA4Y= -github.com/armon/circbuf v0.0.0-20150827004946-bbbad097214e/go.mod h1:3U/XgcO3hCbHZ8TKRvWD2dDTCfh9M9ya+I9JpbB7O8o= -github.com/armon/consul-api v0.0.0-20180202201655-eb2c6b5be1b6/go.mod h1:grANhF5doyWs3UAsr3K4I6qtAmlQcZDesFNEHPZAzj8= -github.com/armon/go-metrics v0.0.0-20180917152333-f0300d1749da/go.mod h1:Q73ZrmVTwzkszR9V5SSuryQ31EELlFMUz1kKyl939pY= -github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8= -github.com/asaskevich/govalidator v0.0.0-20180720115003-f9ffefc3facf/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY= -github.com/asaskevich/govalidator v0.0.0-20190424111038-f61b66f89f4a/go.mod h1:lB+ZfQJz7igIIfQNfa7Ml4HSf2uFQQRzpGGRXenZAgY= -github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q= -github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8= -github.com/bgentry/speakeasy v0.1.0/go.mod h1:+zsyZBPWlz7T6j88CTgSN5bM796AkVf0kBD4zp0CCIs= -github.com/bketelsen/crypt v0.0.3-0.20200106085610-5cbc8cc4026c/go.mod h1:MKsuJmJgSg28kpZDP6UIiPt0e0Oz0kqKNGyRaWEPv84= -github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= -github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc= -github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI= -github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI= -github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU= -github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= -github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk= -github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= -github.com/coreos/etcd v3.3.13+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= -github.com/coreos/go-semver v0.2.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk= -github.com/coreos/go-semver v0.3.0/go.mod h1:nnelYz7RCh+5ahJtPPxZlU+153eP4D4r3EedlOD2RNk= -github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4= -github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA= -github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU= -github.com/davecgh/go-spew v0.0.0-20151105211317-5215b55f46b2/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= -github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= -github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= -github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= -github.com/dgrijalva/jwt-go v0.0.0-20160705203006-01aeca54ebda/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= -github.com/dgrijalva/jwt-go v3.2.0+incompatible/go.mod h1:E3ru+11k8xSBh+hMPgOLZmtrrCbhqsmaPHjLKYnJCaQ= -github.com/dgryski/go-sip13 v0.0.0-20181026042036-e10d5fee7954/go.mod h1:vAd38F8PWV+bWy6jNmig1y/TA+kYO4g3RSRF0IAv0no= -github.com/docker/go-units v0.3.3/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk= -github.com/docker/go-units v0.4.0/go.mod h1:fgPhTUdO+D/Jk86RDLlptpiXQzgHJF7gydDDbaIK4Dk= -github.com/docker/spdystream v0.0.0-20160310174837-449fdfce4d96/go.mod h1:Qh8CwZgvJUkLughtfhJv5dyTYa91l1fOUCrgjqmcifM= -github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE= -github.com/dustmop/soup v1.1.2-0.20190516214245-38228baa104e/go.mod h1:CgNC6SGbT+Xb8wGGvzilttZL1mc5sQ/5KkcxsZttMIk= -github.com/elazarl/goproxy v0.0.0-20170405201442-c4fc26588b6e/go.mod h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc= -github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= -github.com/emicklei/go-restful v1.1.3 h1:KOKLkEASmIa2roa2xEV6WkADqyWrok5dt3TOMMHF1fE= -github.com/emicklei/go-restful v2.9.6+incompatible h1:tfrHha8zJ01ywiOEC1miGY8st1/igzWB8OmvPgoYX7w= -github.com/emicklei/go-restful v2.9.6+incompatible/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= -github.com/emicklei/go-restful v2.15.0+incompatible h1:8KpYO/Xl/ZudZs5RNOEhWMBY4hmzlZhhRd9cu+jrZP4= -github.com/emicklei/go-restful v2.15.0+incompatible/go.mod h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs= -github.com/envoyproxy/go-control-plane v0.9.1-0.20191026205805-5f8ba28d4473/go.mod h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4= -github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= -github.com/evanphx/json-patch v0.0.0-20190203023257-5858425f7550/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= -github.com/evanphx/json-patch v0.5.2 h1:xVCHIVMUu1wtM/VkR9jVZ45N3FhZfYMMYGorLCR8P3k= -github.com/evanphx/json-patch v0.5.2/go.mod h1:ZWS5hhDbVDyob71nXKNL0+PWn6ToqBHMikGIFbs31qQ= -github.com/evanphx/json-patch v4.5.0+incompatible h1:ouOWdg56aJriqS0huScTkVXPC5IcNrDCXZ6OoTAWu7M= -github.com/evanphx/json-patch v4.5.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= -github.com/evanphx/json-patch v4.9.0+incompatible h1:kLcOMZeuLAJvL2BPWLMIj5oaZQobrkAqrL+WFZwQses= -github.com/evanphx/json-patch v4.9.0+incompatible/go.mod h1:50XU6AFN0ol/bzJsmQLiYLvXMP4fmwYFNcr97nuDLSk= -github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4= -github.com/fsnotify/fsnotify v1.4.7 h1:IXs+QLmnXW2CcXuY+8Mzv/fWEsPGWxqefPtCP5CnV9I= -github.com/fsnotify/fsnotify v1.4.7/go.mod h1:jwhsz4b93w/PPRr/qN1Yymfu8t87LnFCMoQvtojpjFo= -github.com/ghodss/yaml v0.0.0-20150909031657-73d445a93680/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= -github.com/ghodss/yaml v1.0.0/go.mod h1:4dBDuWmgqj2HViK6kFavaiC9ZROes6MMH2rRYeMEF04= -github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32 h1:Mn26/9ZMNWSw9C9ERFA1PUxfmGpolnw2v0bKOREu5ew= -github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32/go.mod h1:GIjDIg/heH5DOkXY3YJ/wNhfHsQHoXGjl8G8amsYQ1I= -github.com/globalsign/mgo v0.0.0-20180905125535-1ca0a4f7cbcb/go.mod h1:xkRDCp4j0OGD1HRkm4kmhM+pmpv3AKq5SU7GMg4oO/Q= -github.com/globalsign/mgo v0.0.0-20181015135952-eeefdecb41b8/go.mod h1:xkRDCp4j0OGD1HRkm4kmhM+pmpv3AKq5SU7GMg4oO/Q= -github.com/go-errors/errors v1.0.1 h1:LUHzmkK3GUKUrL/1gfBUxAHzcev3apQlezX/+O7ma6w= -github.com/go-errors/errors v1.0.1/go.mod h1:f4zRHt4oKfwPJE5k8C9vpYG+aDHdBFUsgrm6/TyX73Q= -github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= -github.com/go-kit/kit v0.8.0/go.mod h1:xBxKIO96dXMWWy0MnWVtmwkA9/13aqxPnvrjFYMA2as= -github.com/go-logfmt/logfmt v0.3.0/go.mod h1:Qt1PoO58o5twSAckw1HlFXLmHsOX5/0LbT9GBnD5lWE= -github.com/go-logfmt/logfmt v0.4.0/go.mod h1:3RMwSq7FuexP4Kalkev3ejPJsZTpXXBr9+V4qmtdjCk= -github.com/go-logr/logr v0.1.0/go.mod h1:ixOQHD9gLJUVQQ2ZOR7zLEifBX6tGkNJF4QyIY7sIas= -github.com/go-openapi/analysis v0.0.0-20180825180245-b006789cd277/go.mod h1:k70tL6pCuVxPJOHXQ+wIac1FUrvNkHolPie/cLEU6hI= -github.com/go-openapi/analysis v0.17.0/go.mod h1:IowGgpVeD0vNm45So8nr+IcQ3pxVtpRoBWb8PVZO0ik= -github.com/go-openapi/analysis v0.18.0/go.mod h1:IowGgpVeD0vNm45So8nr+IcQ3pxVtpRoBWb8PVZO0ik= -github.com/go-openapi/analysis v0.19.2/go.mod h1:3P1osvZa9jKjb8ed2TPng3f0i/UY9snX6gxi44djMjk= -github.com/go-openapi/analysis v0.19.5/go.mod h1:hkEAkxagaIvIP7VTn8ygJNkd4kAYON2rCu0v0ObL0AU= -github.com/go-openapi/errors v0.17.0/go.mod h1:LcZQpmvG4wyF5j4IhA73wkLFQg+QJXOQHVjmcZxhka0= -github.com/go-openapi/errors v0.18.0/go.mod h1:LcZQpmvG4wyF5j4IhA73wkLFQg+QJXOQHVjmcZxhka0= -github.com/go-openapi/errors v0.19.2/go.mod h1:qX0BLWsyaKfvhluLejVpVNwNRdXZhEbTA4kxxpKBC94= -github.com/go-openapi/jsonpointer v0.17.0 h1:nH6xp8XdXHx8dqveo0ZuJBluCO2qGrPbDNZ0dwoRHP0= -github.com/go-openapi/jsonpointer v0.17.0/go.mod h1:cOnomiV+CVVwFLk0A/MExoFMjwdsUdVpsRhURCKh+3M= -github.com/go-openapi/jsonreference v0.17.0 h1:yJW3HCkTHg7NOA+gZ83IPHzUSnUzGXhGmsdiCcMexbA= -github.com/go-openapi/jsonreference v0.17.0/go.mod h1:g4xxGn04lDIRh0GJb5QlpE3HfopLOL6uZrK/VgnsK9I= -github.com/go-openapi/loads v0.17.0/go.mod h1:72tmFy5wsWx89uEVddd0RjRWPZm92WRLhf7AC+0+OOU= -github.com/go-openapi/loads v0.18.0/go.mod h1:72tmFy5wsWx89uEVddd0RjRWPZm92WRLhf7AC+0+OOU= -github.com/go-openapi/loads v0.19.0/go.mod h1:72tmFy5wsWx89uEVddd0RjRWPZm92WRLhf7AC+0+OOU= -github.com/go-openapi/loads v0.19.2/go.mod h1:QAskZPMX5V0C2gvfkGZzJlINuP7Hx/4+ix5jWFxsNPs= -github.com/go-openapi/loads v0.19.4/go.mod h1:zZVHonKd8DXyxyw4yfnVjPzBjIQcLt0CCsn0N0ZrQsk= -github.com/go-openapi/runtime v0.0.0-20180920151709-4f900dc2ade9/go.mod h1:6v9a6LTXWQCdL8k1AO3cvqx5OtZY/Y9wKTgaoP6YRfA= -github.com/go-openapi/runtime v0.19.0/go.mod h1:OwNfisksmmaZse4+gpV3Ne9AyMOlP1lt4sK4FXt0O64= -github.com/go-openapi/runtime v0.19.4/go.mod h1:X277bwSUBxVlCYR3r7xgZZGKVvBd/29gLDlFGtJ8NL4= -github.com/go-openapi/spec v0.18.0 h1:aIjeyG5mo5/FrvDkpKKEGZPmF9MPHahS72mzfVqeQXQ= -github.com/go-openapi/spec v0.18.0/go.mod h1:XkF/MOi14NmjsfZ8VtAKf8pIlbZzyoTvZsdfssdxcBI= -github.com/go-openapi/strfmt v0.17.0/go.mod h1:P82hnJI0CXkErkXi8IKjPbNBM6lV6+5pLP5l494TcyU= -github.com/go-openapi/strfmt v0.18.0/go.mod h1:P82hnJI0CXkErkXi8IKjPbNBM6lV6+5pLP5l494TcyU= -github.com/go-openapi/strfmt v0.19.0/go.mod h1:+uW+93UVvGGq2qGaZxdDeJqSAqBqBdl+ZPMF/cC8nDY= -github.com/go-openapi/strfmt v0.19.3/go.mod h1:0yX7dbo8mKIvc3XSKp7MNfxw4JytCfCD6+bY1AVL9LU= -github.com/go-openapi/strfmt v0.19.5/go.mod h1:eftuHTlB/dI8Uq8JJOyRlieZf+WkkxUuk0dgdHXr2Qk= -github.com/go-openapi/swag v0.17.0 h1:iqrgMg7Q7SvtbWLlltPrkMs0UBJI6oTSs79JFRUi880= -github.com/go-openapi/swag v0.17.0/go.mod h1:AByQ+nYG6gQg71GINrmuDXCPWdL640yX49/kXLo40Tg= -github.com/go-openapi/validate v0.18.0/go.mod h1:Uh4HdOzKt19xGIGm1qHf/ofbX1YQ4Y+MYsct2VUrAJ4= -github.com/go-openapi/validate v0.19.2/go.mod h1:1tRCw7m3jtI8eNWEEliiAqUIcBztB2KDnRCRMUi7GTA= -github.com/go-openapi/validate v0.19.8/go.mod h1:8DJv2CVJQ6kGNpFW6eV9N3JviE1C85nY1c2z52x1Gk4= -github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= -github.com/gogo/protobuf v0.0.0-20171007142547-342cbe0a0415/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= -github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= -github.com/gogo/protobuf v1.2.1/go.mod h1:hp+jE20tsWTFYpLwKvXlhS1hjn+gTNwPg2I6zVXpSg4= -github.com/gogo/protobuf v1.2.2-0.20190730201129-28a6bbf47e48 h1:X+zN6RZXsvnrSJaAIQhZezPfAfvsqihKKR8oiLHid34= -github.com/gogo/protobuf v1.2.2-0.20190730201129-28a6bbf47e48/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= -github.com/gogo/protobuf v1.3.1/go.mod h1:SlYgWuQ5SjCEi6WLHjHCa1yvBfUnHcTbrrZtXPKa29o= -github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q= -github.com/gogo/protobuf v1.3.2/go.mod h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q= -github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b/go.mod h1:SBH7ygxi8pfUlaOkMMuAQtPIUF8ecWP5IEl/CR7VP2Q= -github.com/golang/groupcache v0.0.0-20160516000752-02826c3e7903/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= -github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= -github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= -github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= -github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y= -github.com/golang/protobuf v0.0.0-20161109072736-4bd1920723d7/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= -github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= -github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= -github.com/golang/protobuf v1.3.2 h1:6nsPYzhq5kReh6QImI3k5qWzO4PEbvbIW2cwSfR/6xs= -github.com/golang/protobuf v1.3.2/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= -github.com/golang/protobuf v1.3.3/go.mod h1:vzj43D7+SQXF/4pzW/hwtAqwc6iTitCiVSaWz5lYuqw= -github.com/golang/protobuf v1.4.0-rc.1/go.mod h1:ceaxUfeHdC40wWswd/P6IGgMaK3YpKi5j83Wpe3EHw8= -github.com/golang/protobuf v1.4.0-rc.1.0.20200221234624-67d41d38c208/go.mod h1:xKAWHe0F5eneWXFV3EuXVDTCmh+JuBKY0li0aMyXATA= -github.com/golang/protobuf v1.4.0-rc.2/go.mod h1:LlEzMj4AhA7rCAGe4KMBDvJI+AwstrUpVNzEA03Pprs= -github.com/golang/protobuf v1.4.0-rc.4.0.20200313231945-b860323f09d0/go.mod h1:WU3c8KckQ9AFe+yFwt9sWVRKCVIyN9cPHBJSNnbL67w= -github.com/golang/protobuf v1.4.0/go.mod h1:jodUvKwWbYaEsadDk5Fwe5c77LiNKVO9IDvqG2KuDX0= -github.com/golang/protobuf v1.4.1/go.mod h1:U8fpvMrcmy5pZrNK1lt4xCsGvpyWQ/VVv6QDs8UjoX8= -github.com/golang/protobuf v1.4.3 h1:JjCZWpVbqXDqFVmTfYWEVTMIYrL/NPdPSCHPJ0T/raM= -github.com/golang/protobuf v1.4.3/go.mod h1:oDoupMAO8OvCJWAcko0GGGIgR6R6ocIYbsSw735rRwI= -github.com/google/btree v0.0.0-20160524151835-7d79101e329e/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= -github.com/google/btree v0.0.0-20180813153112-4030bb1f1f0c/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= -github.com/google/btree v1.0.0/go.mod h1:lNA+9X1NB3Zf8V7Ke586lFgjr2dZNuvo3lPJSGZ5JPQ= -github.com/google/go-cmp v0.2.0/go.mod h1:oXzfMopK8JAjlY9xF4vHSVASa0yLyX7SntLO5aqRK0M= -github.com/google/go-cmp v0.3.0 h1:crn/baboCvb5fXaQ0IJ1SGTsTVrWpDsCWC8EGETZijY= -github.com/google/go-cmp v0.3.0/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= -github.com/google/go-cmp v0.3.1/go.mod h1:8QqcDgzrUqlUb/G2PQTWiueGozuR1884gddMywk6iLU= -github.com/google/go-cmp v0.4.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= -github.com/google/go-cmp v0.5.0/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= -github.com/google/gofuzz v0.0.0-20161122191042-44d81051d367/go.mod h1:HP5RmnzzSNb993RKQDq4+1A4ia9nllfqcQFTQJedwGI= -github.com/google/gofuzz v0.0.0-20170612174753-24818f796faf/go.mod h1:HP5RmnzzSNb993RKQDq4+1A4ia9nllfqcQFTQJedwGI= -github.com/google/gofuzz v1.0.0 h1:A8PeW59pxE9IoFRqBp37U+mSNaQoZ46F1f0f863XSXw= -github.com/google/gofuzz v1.0.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg= -github.com/google/gofuzz v1.2.0 h1:xRy4A+RhZaiKjJ1bPfwQ8sedCA+YS2YcCHW6ec7JMi0= -github.com/google/gofuzz v1.2.0/go.mod h1:dBl0BpW6vV/+mYPU4Po3pmUjxk6FQPldtuIdl/M65Eg= -github.com/google/martian v2.1.0+incompatible h1:/CP5g8u/VJHijgedC/Legn3BAbAaWPgecwXBIDzw5no= -github.com/google/martian v2.1.0+incompatible/go.mod h1:9I4somxYTbIHy5NJKHRl3wXiIaQGbYVAs8BPL6v8lEs= -github.com/google/pprof v0.0.0-20181206194817-3ea8567a2e57/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= -github.com/google/pprof v0.0.0-20190515194954-54271f7e092f/go.mod h1:zfwlbNMJ+OItoe0UupaVj+oy1omPYYDuagoSzA8v9mc= -github.com/google/renameio v0.1.0/go.mod h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI= -github.com/google/uuid v1.0.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg= -github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk= -github.com/googleapis/gnostic v0.0.0-20170426233943-68f4ded48ba9/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= -github.com/googleapis/gnostic v0.0.0-20170729233727-0c5108395e2d/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= -github.com/googleapis/gnostic v0.3.0 h1:CcQijm0XKekKjP/YCz28LXVSpgguuB+nCxaSjCe09y0= -github.com/googleapis/gnostic v0.3.0/go.mod h1:sJBsCZ4ayReDTBIg8b9dl28c5xFWyhBTVRp3pOg5EKY= -github.com/googleapis/gnostic v0.4.1/go.mod h1:LRhVm6pbyptWbWbuZ38d1eyptfvIytN3ir6b65WBswg= -github.com/googleapis/gnostic v0.5.3 h1:2qsuRm+bzgwSIKikigPASa2GhW8H2Dn4Qq7UxD8K/48= -github.com/googleapis/gnostic v0.5.3/go.mod h1:TRWw1s4gxBGjSe301Dai3c7wXJAZy57+/6tawkOvqHQ= -github.com/gophercloud/gophercloud v0.0.0-20190126172459-c818fa66e4c8/go.mod h1:3WdhXV3rUYy9p6AUW8d94kr+HS62Y4VL9mBnFxsD8q4= -github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY= -github.com/gorilla/websocket v1.4.0/go.mod h1:E7qHFY5m1UJ88s3WnNqhKjPHQ0heANvMoAMk2YaljkQ= -github.com/gorilla/websocket v1.4.2/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE= -github.com/gregjones/httpcache v0.0.0-20170728041850-787624de3eb7/go.mod h1:FecbI9+v66THATjSRHfNgh1IVFe/9kFxbXtjV0ctIMA= -github.com/grpc-ecosystem/go-grpc-middleware v1.0.0/go.mod h1:FiyG127CGDf3tlThmgyCl78X/SZQqEOJBCDaAfeWzPs= -github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgfV/d3M/q6VIi02HzZEHgUlZvzk= -github.com/grpc-ecosystem/grpc-gateway v1.9.0/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY= -github.com/hashicorp/consul/api v1.1.0/go.mod h1:VmuI/Lkw1nC05EYQWNKwWGbkg+FbDBtguAZLlVdkD9Q= -github.com/hashicorp/consul/sdk v0.1.1/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8= -github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= -github.com/hashicorp/go-cleanhttp v0.5.1/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80= -github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60= -github.com/hashicorp/go-msgpack v0.5.3/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM= -github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk= -github.com/hashicorp/go-rootcerts v1.0.0/go.mod h1:K6zTfqpRlCUIjkwsN4Z+hiSfzSTQa6eBIzfwKfwNnHU= -github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU= -github.com/hashicorp/go-syslog v1.0.0/go.mod h1:qPfqrKkXGihmCqbJM2mZgkZGvKG1dFdvsLplgctolz4= -github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro= -github.com/hashicorp/go-uuid v1.0.1/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro= -github.com/hashicorp/go.net v0.0.1/go.mod h1:hjKkEWcCURg++eb33jQU7oqQcI9XDCnUzHA0oac0k90= -github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= -github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= -github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ= -github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64= -github.com/hashicorp/mdns v1.0.0/go.mod h1:tL+uN++7HEJ6SQLQ2/p+z2pH24WQKWjBPkE0mNTz8vQ= -github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2pPBoIllUwCN7I= -github.com/hashicorp/serf v0.8.2/go.mod h1:6hOLApaqBFA1NXqRQAsxw9QxuDEvNxSQRwA/JwenrHc= -github.com/hpcloud/tail v1.0.0 h1:nfCOvKYfkgYP8hkirhJocXT2+zOD8yUNjXaWfTlyFKI= -github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= -github.com/imdario/mergo v0.3.5/go.mod h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA= -github.com/inconshreveable/mousetrap v1.0.0 h1:Z8tu5sraLXCXIcARxBp/8cbvlwVa7Z1NHg9XEKhtSvM= -github.com/inconshreveable/mousetrap v1.0.0/go.mod h1:PxqpIevigyE2G7u3NXJIT2ANytuPF1OarO4DADm73n8= -github.com/jessevdk/go-flags v1.4.0/go.mod h1:4FA24M0QyGHXBuZZK/XkWh8h0e1EYbRYJSGM75WSRxI= -github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= -github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY= -github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y= -github.com/json-iterator/go v0.0.0-20180612202835-f2b4162afba3/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= -github.com/json-iterator/go v0.0.0-20180701071628-ab8a2e0c74be/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= -github.com/json-iterator/go v1.1.6/go.mod h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU= -github.com/json-iterator/go v1.1.7 h1:KfgG9LzI+pYjr4xvmz/5H4FXjokeP+rlHLhv3iH62Fo= -github.com/json-iterator/go v1.1.7/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= -github.com/json-iterator/go v1.1.10 h1:Kz6Cvnvv2wGdaG/V8yMvfkmNiXq9Ya2KUv4rouJJr68= -github.com/json-iterator/go v1.1.10/go.mod h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4= -github.com/jstemmer/go-junit-report v0.0.0-20190106144839-af01ea7f8024/go.mod h1:6v2b51hI/fHJwM22ozAgKL4VKDeJcHhJFhtBdhmNjmU= -github.com/jtolds/gls v4.20.0+incompatible/go.mod h1:QJZ7F/aHp+rZTRtaJ1ow/lLfFfVYBRgL+9YlvaHOwJU= -github.com/julienschmidt/httprouter v1.2.0/go.mod h1:SYymIcj16QtmaHHD7aYtjjsJG7VTCxuUUipMqKk8s4w= -github.com/kisielk/errcheck v1.1.0/go.mod h1:EZBBE59ingxPouuu3KfxchcWSUPOHkagtvWXihfKN4Q= -github.com/kisielk/errcheck v1.2.0/go.mod h1:/BMXB+zMLi60iA8Vv6Ksmxu/1UDYcXs4uQLJ+jE2L00= -github.com/kisielk/errcheck v1.5.0/go.mod h1:pFxgyoBC7bSaBwPgfKdkLd5X25qrDl4LWUI2bnpBCr8= -github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+oQHNcck= -github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ= -github.com/kr/logfmt v0.0.0-20140226030751-b84e30acd515/go.mod h1:+0opPa2QZZtGFBFZlji/RkVcI2GknAs/DXo4wKdlNEc= -github.com/kr/pretty v0.1.0 h1:L/CwN0zerZDmRFUapSPitk6f+Q3+0za1rQkzVuMiMFI= -github.com/kr/pretty v0.1.0/go.mod h1:dAy3ld7l9f0ibDNOQOHHMYYIIbhfbHSm3C4ZsoJORNo= -github.com/kr/pretty v0.2.0/go.mod h1:ipq/a2n7PKx3OHsz4KJII5eveXtPO4qwEXGdVfWzfnI= -github.com/kr/pty v1.1.1/go.mod h1:pFQYn66WHrOpPYNljwOMqo10TkYh1fy3cYio2l3bCsQ= -github.com/kr/text v0.1.0 h1:45sCR5RtlFHMR4UwH9sdQ5TC8v0qDQCHnXt+kaKSTVE= -github.com/kr/text v0.1.0/go.mod h1:4Jbv+DJW3UT/LiOwJeYQe1efqtUx/iVham/4vfdArNI= -github.com/kubernetes-sigs/kustomize v1.0.11 h1:vt7VtxzT8OY+fIafU6BITR7nPzqHTQkF6l4RxEHmtxw= -github.com/kubernetes-sigs/kustomize v2.0.3+incompatible h1:3hC4tnibtc3SVKd6VLMM6GYrRfFMj77Tc5UmdjMa4B0= -github.com/kubernetes-sigs/kustomize v2.0.3+incompatible/go.mod h1:LEfoFBposdQuHJ4ZX2gdT7eoybOslchqvocZtlLyTsk= -github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ= -github.com/magiconair/properties v1.8.1/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ= -github.com/mailru/easyjson v0.0.0-20160728113105-d5b7844b561a/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= -github.com/mailru/easyjson v0.0.0-20180823135443-60711f1a8329/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= -github.com/mailru/easyjson v0.0.0-20190312143242-1de009706dbe/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= -github.com/mailru/easyjson v0.0.0-20190620125010-da37f6c1e481 h1:IaSjLMT6WvkoZZjspGxy3rdaTEmWLoRm49WbtVUi9sA= -github.com/mailru/easyjson v0.0.0-20190620125010-da37f6c1e481/go.mod h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc= -github.com/mailru/easyjson v0.7.0 h1:aizVhC/NAAcKWb+5QsU1iNOZb4Yws5UO2I+aIprQITM= -github.com/mailru/easyjson v0.7.0/go.mod h1:KAzv3t3aY1NaHWoQz1+4F1ccyAH66Jk7yos7ldAVICs= -github.com/mailru/easyjson v0.7.6 h1:8yTIVnZgCoiM1TgqoeTl+LfU5Jg6/xL3QhGQnimLYnA= -github.com/mailru/easyjson v0.7.6/go.mod h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc= -github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU= -github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4= -github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= -github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg= -github.com/mitchellh/cli v1.0.0/go.mod h1:hNIlj7HEI86fIcpObd7a0FcrxTWetlwJDGcceTlRvqc= -github.com/mitchellh/go-homedir v1.0.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0= -github.com/mitchellh/go-testing-interface v1.0.0/go.mod h1:kRemZodwjscx+RGhAo8eIhFbs2+BFgRtFPeD/KE+zxI= -github.com/mitchellh/gox v0.4.0/go.mod h1:Sd9lOJ0+aimLBi73mGofS1ycjY8lL3uZM3JPS42BGNg= -github.com/mitchellh/iochan v1.0.0/go.mod h1:JwYml1nuB7xOzsp52dPpHFffvOCDupsG0QubkSMEySY= -github.com/mitchellh/mapstructure v0.0.0-20160808181253-ca63d7c062ee/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y= -github.com/mitchellh/mapstructure v1.1.2/go.mod h1:FVVH3fgwuzCH5S8UJGiWEs2h04kUh9fWfEaFds41c1Y= -github.com/modern-go/concurrent v0.0.0-20180228061459-e0a39a4cb421/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= -github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd h1:TRLaZ9cD/w8PVh93nsPXa1VrQ6jlwL5oN8l14QlcNfg= -github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd/go.mod h1:6dJC0mAP4ikYIbvyc7fijjWJddQyLn8Ig3JB5CqoB9Q= -github.com/modern-go/reflect2 v0.0.0-20180320133207-05fbef0ca5da/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= -github.com/modern-go/reflect2 v0.0.0-20180701023420-4b7aa43c6742/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= -github.com/modern-go/reflect2 v1.0.1 h1:9f412s+6RmYXLWZSEzVVgPGK7C2PphHj5RJrvfx9AWI= -github.com/modern-go/reflect2 v1.0.1/go.mod h1:bx2lNnkwVCuqBIxFjflWJWanXIb3RllmbCylyMrvgv0= -github.com/mohae/deepcopy v0.0.0-20170929034955-c48cc78d4826/go.mod h1:TaXosZuwdSHYgviHp1DAtfrULt5eUgsSMsZf+YrPgl8= -github.com/munnerz/goautoneg v0.0.0-20120707110453-a547fc61f48d/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= -github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= -github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f/go.mod h1:ZdcZmHo+o7JKHSa8/e818NopupXU1YMK5fe1lsApnBw= -github.com/oklog/ulid v1.3.1/go.mod h1:CirwcVhetQ6Lv90oh/F+FBtV6XMibvdAFo93nm5qn4U= -github.com/onsi/ginkgo v0.0.0-20170829012221-11459a886d9c/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.6.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/ginkgo v1.8.0 h1:VkHVNpR4iVnU8XQR6DBm8BqYjN7CRzw+xKUbVVbbW9w= -github.com/onsi/ginkgo v1.8.0/go.mod h1:lLunBs/Ym6LB5Z9jYTR76FiuTmxDTDusOGeTQH+WWjE= -github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGVU+Z6iS04AVkA3Q65CEZX59MT0QO5uiA= -github.com/onsi/gomega v0.0.0-20190113212917-5533ce8a0da3/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= -github.com/onsi/gomega v1.5.0 h1:izbySO9zDPmjJ8rDjLvkA2zJHIo+HkYXHnf7eN7SSyo= -github.com/onsi/gomega v1.5.0/go.mod h1:ex+gbHU/CVuBBDIJjb2X0qEXbFg53c61hWP/1CpauHY= -github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc= -github.com/paulmach/orb v0.1.3/go.mod h1:VFlX/8C+IQ1p6FTRRKzKoOPJnvEtA5G0Veuqwbu//Vk= -github.com/pborman/uuid v1.2.0/go.mod h1:X/NO0urCmaxf9VXbdlT7C2Yzkj2IKimNn4k+gtPdI/k= -github.com/pelletier/go-toml v1.2.0/go.mod h1:5z9KED0ma1S8pY6P1sdut58dfprrGBbd/94hg7ilaic= -github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU= -github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= -github.com/pkg/errors v0.8.1 h1:iURUrRGxPUNPdy5/HRSm+Yj6okJ6UtLINN0Q9M4+h3I= -github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= -github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= -github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= -github.com/pmezard/go-difflib v0.0.0-20151028094244-d8ed2627bdf0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= -github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= -github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= -github.com/posener/complete v1.1.1/go.mod h1:em0nMJCgc9GFtwrmVmEMR/ZL6WyhyjMBndrE9hABlRI= -github.com/prometheus/client_golang v0.9.1/go.mod h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw= -github.com/prometheus/client_golang v0.9.3/go.mod h1:/TN21ttK/J9q6uSwhBd54HahCDft0ttaMvbicHlPoso= -github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo= -github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= -github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= -github.com/prometheus/common v0.0.0-20181113130724-41aa239b4cce/go.mod h1:daVV7qP5qjZbuso7PdcryaAu0sAZbrN9i7WWcTMWvro= -github.com/prometheus/common v0.4.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4= -github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk= -github.com/prometheus/procfs v0.0.0-20190507164030-5867b95ac084/go.mod h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA= -github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= -github.com/qri-io/starlib v0.4.2-0.20200213133954-ff2e8cd5ef8d/go.mod h1:7DPO4domFU579Ga6E61sB9VFNaniPVwJP5C4bBCu3wA= -github.com/rogpeppe/fastuuid v0.0.0-20150106093220-6724a57986af/go.mod h1:XWv6SoW27p1b0cqNHllgS5HIMJraePCO15w5zCzIWYg= -github.com/rogpeppe/go-internal v1.3.0/go.mod h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4= -github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= -github.com/ryanuber/columnize v0.0.0-20160712163229-9b3edd62028f/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts= -github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc= -github.com/sergi/go-diff v1.0.0/go.mod h1:0CfEIISq7TuYL3j771MWULgwwjU+GofnZX9QAmXWZgo= -github.com/sergi/go-diff v1.1.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= -github.com/shurcooL/sanitized_anchor_name v1.0.0/go.mod h1:1NzhyTcUVG4SuEtjjoZeVRXNmyL/1OwPU0+IJeTBvfc= -github.com/sirupsen/logrus v1.2.0/go.mod h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo= -github.com/smartystreets/assertions v0.0.0-20180927180507-b2de0cb4f26d/go.mod h1:OnSkiWE9lh6wB0YB77sQom3nweQdgAjqCqsofrRNTgc= -github.com/smartystreets/goconvey v1.6.4/go.mod h1:syvi0/a8iFYH4r/RixwvyeAJjdLS9QV7WQ/tjFTllLA= -github.com/soheilhy/cmux v0.1.4/go.mod h1:IM3LyeVVIOuxMH7sFAkER9+bJ4dT7Ms6E4xg4kGIyLM= -github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= -github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ= -github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE= -github.com/spf13/cobra v0.0.2/go.mod h1:1l0Ry5zgKvJasoi3XT1TypsSe7PqH0Sj9dhYf7v3XqQ= -github.com/spf13/cobra v1.0.0 h1:6m/oheQuQ13N9ks4hubMG6BnvwOeaJrqSPLahSnczz8= -github.com/spf13/cobra v1.0.0/go.mod h1:/6GTrnGXV9HjY+aR4k0oJ5tcvakLuG6EuKReYlHNrgE= -github.com/spf13/cobra v1.1.1 h1:KfztREH0tPxJJ+geloSLaAkaPkr4ki2Er5quFV1TDo4= -github.com/spf13/cobra v1.1.1/go.mod h1:WnodtKOvamDL/PwE2M4iKs8aMDBZ5Q5klgD3qfVJQMI= -github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo= -github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= -github.com/spf13/pflag v1.0.1/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= -github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4= -github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA= -github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= -github.com/spf13/viper v1.4.0/go.mod h1:PTJ7Z/lr49W6bUbkmS1V3by4uWynFiR9p7+dSq/yZzE= -github.com/spf13/viper v1.7.0/go.mod h1:8WkrPz2fc9jxqZNCJI/76HCieCp4Q8HaLFoCha5qpdg= -github.com/stoewer/go-strcase v1.2.0/go.mod h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8= -github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= -github.com/stretchr/objx v0.1.1/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= -github.com/stretchr/objx v0.2.0/go.mod h1:qt09Ya8vawLte6SNmTgCsAVtYtaKzEcn8ATUoHMkEqE= -github.com/stretchr/testify v0.0.0-20151208002404-e3a8ff8ce365/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= -github.com/stretchr/testify v1.2.2/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= -github.com/stretchr/testify v1.2.3-0.20181224173747-660f15d67dbb/go.mod h1:a8OnRcib4nhh0OaRAV+Yts87kKdq0PP7pXfy6kDkUVs= -github.com/stretchr/testify v1.3.0/go.mod h1:M5WIy9Dh21IEIfnGCwXGc5bZfKNJtfHm1UVUgZn+9EI= -github.com/stretchr/testify v1.4.0 h1:2E4SXV/wtOkTonXsotYi4li6zVWxYlZuYNCXe9XRJyk= -github.com/stretchr/testify v1.4.0/go.mod h1:j7eGeouHqKxXV5pUuKE4zz7dFj8WfuZ+81PSLYec5m4= -github.com/stretchr/testify v1.5.1/go.mod h1:5W2xD1RspED5o8YsWQXVCued0rvSQ+mT+I5cxcmMvtA= -github.com/subosito/gotenv v1.2.0/go.mod h1:N0PQaV/YGNqwC0u51sEeR/aUtSLEXKX9iv69rRypqCw= -github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= -github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U= -github.com/ugorji/go v1.1.4/go.mod h1:uQMGLiO92mf5W77hV/PUCpI3pbzQx3CRekS0kk+RGrc= -github.com/vektah/gqlparser v1.1.2/go.mod h1:1ycwN7Ij5njmMkPPAOaRFY4rET2Enx7IkVv3vaXspKw= -github.com/xiang90/probing v0.0.0-20190116061207-43a291ad63a2/go.mod h1:UETIi67q53MR2AWcXfiuqkDkRtnGDLqkBTpCHuJHxtU= -github.com/xlab/treeprint v0.0.0-20181112141820-a009c3971eca h1:1CFlNzQhALwjS9mBAUkycX616GzgsuYUOCHA5+HSlXI= -github.com/xlab/treeprint v0.0.0-20181112141820-a009c3971eca/go.mod h1:ce1O1j6UtZfjr22oyGxGLbauSBp2YVXpARAosm7dHBg= -github.com/xordataexchange/crypt v0.0.3-0.20170626215501-b2862e3d0a77/go.mod h1:aYKd//L2LvnjZzWKhF00oedf4jCCReLcmhLdhm1A27Q= -github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= -github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= -go.etcd.io/bbolt v1.3.2/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU= -go.mongodb.org/mongo-driver v1.0.3/go.mod h1:u7ryQJ+DOzQmeO7zB6MHyr8jkEQvC8vH7qLUO4lqsUM= -go.mongodb.org/mongo-driver v1.1.1/go.mod h1:u7ryQJ+DOzQmeO7zB6MHyr8jkEQvC8vH7qLUO4lqsUM= -go.mongodb.org/mongo-driver v1.1.2/go.mod h1:u7ryQJ+DOzQmeO7zB6MHyr8jkEQvC8vH7qLUO4lqsUM= -go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU= -go.opencensus.io v0.22.0/go.mod h1:+kGneAE2xo2IficOXnaByMWTGM9T73dGwxeWcUqIpI8= -go.starlark.net v0.0.0-20190528202925-30ae18b8564f/go.mod h1:c1/X6cHgvdXj6pUlmWKMkuqRnW4K8x2vwt6JAaaircg= -go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5/go.mod h1:nmDLcffg48OtT/PSW0Hg7FvpRQsQh5OSqIylirxKC7o= -go.uber.org/atomic v1.4.0/go.mod h1:gD2HeocX3+yG+ygLZcrzQJaqmWj9AIm7n08wl/qW/PE= -go.uber.org/multierr v1.1.0/go.mod h1:wR5kodmAFQ0UK8QlbwjlSNy0Z68gJhDJUG5sjR94q/0= -go.uber.org/zap v1.10.0/go.mod h1:vwi/ZaCAaUcBkycHslxD9B2zi4UTXhF60s6SWpuDF0Q= -golang.org/x/crypto v0.0.0-20181203042331-505ab145d0a9/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= -golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= -golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= -golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= -golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek= -golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY= -golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js= -golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0= -golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= -golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= -golang.org/x/lint v0.0.0-20190301231843-5614ed5bae6f/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= -golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= -golang.org/x/lint v0.0.0-20190409202823-959b441ac422/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= -golang.org/x/lint v0.0.0-20190909230951-414d861bb4ac/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= -golang.org/x/lint v0.0.0-20190930215403-16217165b5de/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= -golang.org/x/mobile v0.0.0-20190312151609-d3739f865fa6/go.mod h1:z+o9i4GpDbdi3rU15maQ/Ox0txvL9dWGYEHz965HBQE= -golang.org/x/mobile v0.0.0-20190719004257-d2bd2a29d028/go.mod h1:E/iHnbuqvinMTCcRqshq8CkpyQDoeVncDDYHnLhea+o= -golang.org/x/mod v0.0.0-20190513183733-4bf6d317e70e/go.mod h1:mXi4GBBbnImb6dmsKGUJ2LatrhH/nqhxcFungHvyanc= -golang.org/x/mod v0.1.0/go.mod h1:0QHyrYULN0/3qlju5TqG8bIK38QM8yzMo5ekMj3DlcY= -golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= -golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= -golang.org/x/net v0.0.0-20170114055629-f2499483f923/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180218175443-cbe0f9307d01/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20180906233101-161cd47e91fd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20181005035420-146acd28ed58/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20181023162649-9b4f9f5ad519/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20181114220301-adae6a3d119a/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20181201002055-351d144fa1fc/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20181220203305-927f97764cc3/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20190108225652-1e06a53dbb7e/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20190206173232-65e2d4e15006/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20190213061140-3a22650c66bd/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= -golang.org/x/net v0.0.0-20190311183353-d8887717615a/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= -golang.org/x/net v0.0.0-20190320064053-1272bf9dcd53/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= -golang.org/x/net v0.0.0-20190501004415-9ce7a6920f09/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= -golang.org/x/net v0.0.0-20190503192946-f4e77d36d62c/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= -golang.org/x/net v0.0.0-20190522155817-f3200d17e092/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= -golang.org/x/net v0.0.0-20190603091049-60506f45cf65/go.mod h1:HSz+uSET+XFnRR8LxR5pz3Of3rY3CfYBVs4xY44aLks= -golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20200226121028-0de0cce0169b h1:0mm1VjtFUOIlE1SbDlwjYaDxZVDP2S5ou6y0gSgXHu8= -golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= -golang.org/x/net v0.0.0-20200324143707-d3edc9973b7e/go.mod h1:qpuaurCH72eLCgpAm/N6yyVIVM9cpaDIP3A8BGJEC5A= -golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU= -golang.org/x/net v0.0.0-20201224014010-6772e930b67b h1:iFwSg7t5GZmB/Q5TjiEAsdoLDrdJRC1RiF2WhuV29Qw= -golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg= -golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= -golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= -golang.org/x/oauth2 v0.0.0-20190402181905-9f3314589c9a/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= -golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= -golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20181108010431-42b317875d0f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20190227155943-e225da77a7e6/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sys v0.0.0-20170830134202-bb24a47a89ea/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180823144017-11551d06cbcc/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20181026203630-95b1ffbd15a5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20181107165924-66b7b1311ac8/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= -golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190321052220-f7bb7a8bee54/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190502145724-3ef323f4f1fd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190507160741-ecd444e8653b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190606165138-5da285871e9c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190621203818-d432491b9138/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20190624142023-c5567b49c5d0/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20191002063906-3421d5a6bb1c h1:Vco5b+cuG5NNfORVxZy6bYZQ7rsigisU1WQFkvQ0L5E= -golang.org/x/sys v0.0.0-20191002063906-3421d5a6bb1c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20200323222414-85ca7c5b95cd/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= -golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= -golang.org/x/text v0.0.0-20160726164857-2910a502d2bf/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= -golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= -golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= -golang.org/x/text v0.3.1-0.20181227161524-e6919f6577db/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= -golang.org/x/text v0.3.2 h1:tW2bmiBqwgJj/UpqtC8EpXEZVYOwU0yG4iWbprSVAcs= -golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= -golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= -golang.org/x/text v0.3.5 h1:i6eZZ+zk0SOf0xgBpEpPD18qWcJda6q1sxt3S0kzyUQ= -golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= -golang.org/x/time v0.0.0-20161028155119-f51c12702a4d/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= -golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= -golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= -golang.org/x/tools v0.0.0-20180221164845-07fd8470d635/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181011042414-1f849cf54d09/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20181030221726-6c7e314b6563/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20190125232054-d66bd3c5d5a6/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= -golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY= -golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= -golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= -golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= -golang.org/x/tools v0.0.0-20190328211700-ab21143f2384/go.mod h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs= -golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= -golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= -golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q= -golang.org/x/tools v0.0.0-20190606124116-d0a3d012864b/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= -golang.org/x/tools v0.0.0-20190617190820-da514acc4774/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= -golang.org/x/tools v0.0.0-20190621195816-6e04913cbbac/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= -golang.org/x/tools v0.0.0-20190628153133-6cdbf07be9d0/go.mod h1:/rFqwRUd4F7ZHNgwSSTFct+R/Kf4OFW1sUzUTQQTgfc= -golang.org/x/tools v0.0.0-20190816200558-6889da9d5479/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= -golang.org/x/tools v0.0.0-20190911174233-4f2ddba30aff/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= -golang.org/x/tools v0.0.0-20191012152004-8de300cfc20a/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= -golang.org/x/tools v0.0.0-20191112195655-aa38f8e97acc/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= -golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= -golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= -golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= -golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= -golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= -golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= -golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= -google.golang.org/api v0.4.0/go.mod h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE= -google.golang.org/api v0.7.0/go.mod h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M= -google.golang.org/api v0.8.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= -google.golang.org/api v0.9.0/go.mod h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg= -google.golang.org/api v0.13.0/go.mod h1:iLdEw5Ide6rF15KTC1Kkl0iskquN2gFfn9o9XIsbkAI= -google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM= -google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= -google.golang.org/appengine v1.5.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= -google.golang.org/appengine v1.6.1/go.mod h1:i06prIuMbXzDqacNJfV5OdTW448YApPu5ww/cMBSeb0= -google.golang.org/genproto v0.0.0-20180817151627-c66870c02cf8/go.mod h1:JiN7NxoALGmiZfu7CAH4rXhgtRTLTxftemlI0sWmxmc= -google.golang.org/genproto v0.0.0-20190307195333-5fe7a883aa19/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= -google.golang.org/genproto v0.0.0-20190418145605-e7d98fc518a7/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= -google.golang.org/genproto v0.0.0-20190425155659-357c62f0e4bb/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= -google.golang.org/genproto v0.0.0-20190502173448-54afdca5d873/go.mod h1:VzzqZJRnGkLBvHegQrXjBqPurQTc5/KpmUdxsrq26oE= -google.golang.org/genproto v0.0.0-20190801165951-fa694d86fc64/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= -google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98Agz4BDEuKkezgsaosCRResVns1a3J2ZsMNc= -google.golang.org/genproto v0.0.0-20190911173649-1774047e7e51/go.mod h1:IbNlFCBrqXvoKpeg0TB2l7cyZUmoaFKYIwrEpbDKLA8= -google.golang.org/genproto v0.0.0-20191108220845-16a3f7862a1a/go.mod h1:n3cpQtvxv34hfy77yVDNjmbRyujviMdxYliBSkLhpCc= -google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo= -google.golang.org/genproto v0.0.0-20201019141844-1ed22bb0c154/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= -google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= -google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= -google.golang.org/grpc v1.21.0/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= -google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= -google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= -google.golang.org/grpc v1.27.0/go.mod h1:qbnxyOmOxrQa7FizSgH+ReBfzJrCY1pSN7KXBS8abTk= -google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= -google.golang.org/protobuf v0.0.0-20200221191635-4d8936d0db64/go.mod h1:kwYJMbMJ01Woi6D6+Kah6886xMZcty6N08ah7+eCXa0= -google.golang.org/protobuf v0.0.0-20200228230310-ab0ca4ff8a60/go.mod h1:cfTl7dwQJ+fmap5saPgwCLgHXTUD7jkjRqWcaiX5VyM= -google.golang.org/protobuf v1.20.1-0.20200309200217-e05f789c0967/go.mod h1:A+miEFZTKqfCUM6K7xSMQL9OKL/b6hQv+e19PK+JZNE= -google.golang.org/protobuf v1.21.0/go.mod h1:47Nbq4nVaFHyn7ilMalzfO3qCViNmqZ2kzikPIcrTAo= -google.golang.org/protobuf v1.22.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= -google.golang.org/protobuf v1.23.0/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= -google.golang.org/protobuf v1.23.1-0.20200526195155-81db48ad09cc/go.mod h1:EGpADcykh3NcUnDUJcl1+ZksZNG86OlYog2l/sGQquU= -google.golang.org/protobuf v1.24.0 h1:UhZDfRO8JRQru4/+LlLE0BRKGF8L+PICnvYZmx/fEGA= -google.golang.org/protobuf v1.24.0/go.mod h1:r/3tXBNzIEhYS9I1OUVjXDlt8tc493IdKGjtUeSXeh4= -google.golang.org/protobuf v1.25.0 h1:Ejskq+SyPohKW+1uil0JJMtmHCgJPJ/qWTxr8qp+R4c= -google.golang.org/protobuf v1.25.0/go.mod h1:9JNX74DMeImyA3h4bdi1ymwjUzf21/xIlbajtzgsN7c= -gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw= -gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= -gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 h1:qIbj1fsPNlZgppZ+VLlY7N33q108Sa+fhmuc+sWQYwY= -gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= -gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 h1:YR8cESwS4TdDjEe65xsg0ogRM/Nc3DYOhEAlW+xobZo= -gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= -gopkg.in/errgo.v2 v2.1.0/go.mod h1:hNsd1EY+bozCKY1Ytp96fpM3vjJbqLJn88ws8XvfDNI= -gopkg.in/fsnotify.v1 v1.4.7 h1:xOHLXZwVvI9hhs+cLKq5+I5onOuwQLhQwiu63xxlHs4= -gopkg.in/fsnotify.v1 v1.4.7/go.mod h1:Tz8NjZHkW78fSQdbUxIjBTcgA1z1m8ZHf0WmKUhAMys= -gopkg.in/inf.v0 v0.9.0/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw= -gopkg.in/inf.v0 v0.9.1 h1:73M5CoZyi3ZLMOyDlQh031Cx6N9NDJ2Vvfl76EDAgDc= -gopkg.in/inf.v0 v0.9.1/go.mod h1:cWUDdTG/fYaXco+Dcufb5Vnc6Gp2YChqWtbxRZE0mXw= -gopkg.in/ini.v1 v1.51.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k= -gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 h1:uRGJdciOHaEIrze2W8Q3AKkepLTh2hOroT7a+7czfdQ= -gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7/go.mod h1:dt/ZhP58zS4L8KSrWDmTeBkI65Dw0HsyUHuEVlX15mw= -gopkg.in/yaml.v2 v2.0.0-20170812160011-eb3733d160e7/go.mod h1:JAlM8MvJe8wmxCU4Bli9HhUf9+ttbYbLASfIpnQbh74= -gopkg.in/yaml.v2 v2.2.1/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= -gopkg.in/yaml.v2 v2.2.2/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= -gopkg.in/yaml.v2 v2.2.4 h1:/eiJrUcujPVeJ3xlSWaiNi3uSVmDGBK1pDHUHAnao1I= -gopkg.in/yaml.v2 v2.2.4/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= -gopkg.in/yaml.v2 v2.2.7 h1:VUgggvou5XRW9mHwD/yXxIYSMtY0zoKQf/v226p2nyo= -gopkg.in/yaml.v2 v2.2.7/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= -gopkg.in/yaml.v2 v2.2.8/go.mod h1:hI93XBmqTisBFMUTm0b8Fm+jr3Dg1NNxqwp+5A1VGuI= -gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY= -gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ= -gopkg.in/yaml.v3 v3.0.0-20191120175047-4206685974f2 h1:XZx7nhd5GMaZpmDaEHFVafUZC7ya0fuo7cSJ3UCKYmM= -gopkg.in/yaml.v3 v3.0.0-20191120175047-4206685974f2/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776 h1:tQIYjPdBoyREyB9XMu+nnTclpTYkz2zFM+lzLJFO4gQ= -gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b h1:h8qDotaEPuJATrMmW04NCwg7v22aHH28wwpauUhK9Oo= -gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= -k8s.io/api v0.0.0-20190620084959-7cf5895f2711 h1:BblVYz/wE5WtBsD/Gvu54KyBUTJMflolzc5I2DTvh50= -k8s.io/api v0.0.0-20190620084959-7cf5895f2711/go.mod h1:TBhBqb1AWbBQbW3XRusr7n7E4v2+5ZY8r8sAMnyFC5A= -k8s.io/apimachinery v0.0.0-20190612205821-1799e75a0719 h1:uV4S5IB5g4Nvi+TBVNf3e9L4wrirlwYJ6w88jUQxTUw= -k8s.io/apimachinery v0.0.0-20190612205821-1799e75a0719/go.mod h1:I4A+glKBHiTgiEjQiCCQfCAIcIMFGt291SmsvcrFzJA= -k8s.io/client-go v0.0.0-20190620085101-78d2af792bab h1:E8Fecph0qbNsAbijJJQryKu4Oi9QTp5cVpjTE+nqg6g= -k8s.io/client-go v0.0.0-20190620085101-78d2af792bab/go.mod h1:E95RaSlHr79aHaX0aGSwcPNfygDiPKOVXdmivCIZT0k= -k8s.io/gengo v0.0.0-20190128074634-0689ccc1d7d6/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= -k8s.io/gengo v0.0.0-20200413195148-3a45101e95ac/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0= -k8s.io/klog v0.0.0-20181102134211-b9b56d5dfc92/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= -k8s.io/klog v0.3.1/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= -k8s.io/klog v0.3.3/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk= -k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= -k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I= -k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE= -k8s.io/kube-openapi v0.0.0-20190228160746-b3a7cee44a30/go.mod h1:BXM9ceUBTj2QnfH2MK1odQs778ajze1RxcmP6S8RVVc= -k8s.io/kube-openapi v0.0.0-20190603182131-db7b694dc208/go.mod h1:nfDlWeOsu3pUf4yWGL+ERqohP4YsZcBJXWMK+gkzOA4= -k8s.io/kube-openapi v0.0.0-20190918143330-0270cf2f1c1d h1:Xpe6sK+RY4ZgCTyZ3y273UmFmURhjtoJiwOMbQsXitY= -k8s.io/kube-openapi v0.0.0-20190918143330-0270cf2f1c1d/go.mod h1:1TqjTSzOxsLGIKfj0lK8EeCP7K1iUG65v09OM0/WG5E= -k8s.io/kube-openapi v0.0.0-20210113233702-8566a335510f h1:ZcWbnalfwIst131Zff7dGd1HQdt+NA9q7z9Fi0vbsHY= -k8s.io/kube-openapi v0.0.0-20210113233702-8566a335510f/go.mod h1:WOJ3KddDSol4tAGcJo0Tvi+dK12EcqSLqcWsryKMpfM= -k8s.io/utils v0.0.0-20190221042446-c2654d5206da/go.mod h1:8k8uAuAQ0rXslZKaEWd0c3oVhZz7sSzSiPnVZayjIX0= -rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8= -sigs.k8s.io/kustomize v1.0.11 h1:Yb+6DDt9+aR2AvQApvUaKS/ugteeG4MPyoFeUHiPOjk= -sigs.k8s.io/kustomize v2.0.3+incompatible h1:JUufWFNlI44MdtnjUqVnvh29rR37PQFzPbLXqhyOyX0= -sigs.k8s.io/kustomize v2.0.3+incompatible/go.mod h1:MkjgH3RdOWrievjo6c9T245dYlB5QeXV4WCbnt/PEpU= -sigs.k8s.io/kustomize/kyaml v0.1.11 h1:/VvWxVIgH5gG1K4A7trgbyLgO3tRBiAWNhLFVU1HEmo= -sigs.k8s.io/kustomize/kyaml v0.1.11/go.mod h1:72/rLkSi+L/pHM1oCjwrf3ClU+tH5kZQvvdLSqIHwWU= -sigs.k8s.io/kustomize/v3 v3.2.0 h1:EKcEubO29vCbigcMoNynfyZH+ANWkML2UHWibt1Do7o= -sigs.k8s.io/kustomize/v3 v3.2.0/go.mod h1:ztX4zYc/QIww3gSripwF7TBOarBTm5BvyAMem0kCzOE= -sigs.k8s.io/structured-merge-diff v0.0.0-20190525122527-15d366b2352e/go.mod h1:wWxsB5ozmmv/SG7nM11ayaAW51xMvak/t1r0CSlcokI= -sigs.k8s.io/structured-merge-diff/v4 v4.0.2/go.mod h1:bJZC9H9iH24zzfZ/41RGcq60oK1F7G282QMXDPYydCw= -sigs.k8s.io/yaml v1.1.0 h1:4A07+ZFc2wgJwo8YNlQpr1rVlgUDlxXHhPJciaPY5gs= -sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o= -sigs.k8s.io/yaml v1.2.0 h1:kr/MCeFWJWTwyaHoR9c8EjH9OumOmoF9YGiZd7lFm/Q= -sigs.k8s.io/yaml v1.2.0/go.mod h1:yfXDCHCao9+ENCvLSE62v9VSji2MKu5jeNfTrofGhJc= diff --git a/tests/katib/installs/katib-external-db/kustomize_test.go b/tests/katib/installs/katib-external-db/kustomize_test.go deleted file mode 100644 index d2c05778b3..0000000000 --- a/tests/katib/installs/katib-external-db/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib_external_db - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../katib/installs/katib-external-db", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index af0cff0fa5..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 9e9354080f..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 181522ba81..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index 1abe6feb77..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 56311273eb..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_USER - valueFrom: - secretKeyRef: - key: DB_USER - name: katib-mysql-secrets-kmcg6hfkfg - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: DB_PASSWORD - name: katib-mysql-secrets-kmcg6hfkfg - - name: KATIB_MYSQL_DB_DATABASE - valueFrom: - secretKeyRef: - key: KATIB_MYSQL_DB_DATABASE - name: katib-mysql-secrets-kmcg6hfkfg - - name: KATIB_MYSQL_DB_HOST - valueFrom: - secretKeyRef: - key: KATIB_MYSQL_DB_HOST - name: katib-mysql-secrets-kmcg6hfkfg - - name: KATIB_MYSQL_DB_PORT - valueFrom: - secretKeyRef: - key: KATIB_MYSQL_DB_PORT - name: katib-mysql-secrets-kmcg6hfkfg - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/katib/installs/katib-external-db/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 3cf610245b..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.$(katib-ui-namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-mysql-secrets-kmcg6hfkfg.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-mysql-secrets-kmcg6hfkfg.yaml deleted file mode 100644 index b6c73978cb..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_secret_katib-mysql-secrets-kmcg6hfkfg.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - DB_PASSWORD: "" - DB_USER: "" - KATIB_MYSQL_DB_DATABASE: "" - KATIB_MYSQL_DB_HOST: "" - KATIB_MYSQL_DB_PORT: "" -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets-kmcg6hfkfg - namespace: kubeflow -type: Opaque diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/katib/installs/katib-external-db/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/kustomize_test.go b/tests/katib/installs/katib-standalone-ibm/kustomize_test.go deleted file mode 100644 index 033fccc6ec..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib_standalone_ibm - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../katib/installs/katib-standalone-ibm", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index a40300472f..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:5.6 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 3cf610245b..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.$(katib-ui-namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/katib/installs/katib-standalone-ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/kustomize_test.go b/tests/katib/installs/katib-standalone/kustomize_test.go deleted file mode 100644 index 085f8ae12d..0000000000 --- a/tests/katib/installs/katib-standalone/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib_standalone - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../katib/installs/katib-standalone", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/katib/installs/katib-standalone/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 3cf610245b..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.$(katib-ui-namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/katib/installs/katib-standalone/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/legacy_kustomizations/api-service/kustomization.yaml b/tests/legacy_kustomizations/api-service/kustomization.yaml deleted file mode 100644 index 20b60a2eb5..0000000000 --- a/tests/legacy_kustomizations/api-service/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/api-service/base -commonLabels: - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/api-service/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/application-crds/kustomization.yaml b/tests/legacy_kustomizations/application-crds/kustomization.yaml deleted file mode 100644 index 4a9c4fc9b8..0000000000 --- a/tests/legacy_kustomizations/application-crds/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../application/application-crds/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/application/kustomization.yaml b/tests/legacy_kustomizations/application/kustomization.yaml deleted file mode 100644 index c49fbf8c97..0000000000 --- a/tests/legacy_kustomizations/application/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../application/application/base -commonLabels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: parameters -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../application/application/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/application/params_0.env b/tests/legacy_kustomizations/application/params_0.env deleted file mode 100644 index 5cd1143189..0000000000 --- a/tests/legacy_kustomizations/application/params_0.env +++ /dev/null @@ -1 +0,0 @@ -project=jlewi-dev diff --git a/tests/legacy_kustomizations/argo/kustomization.yaml b/tests/legacy_kustomizations/argo/kustomization.yaml deleted file mode 100644 index ae7f929f4a..0000000000 --- a/tests/legacy_kustomizations/argo/kustomization.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../argo/base -commonLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: workflow-controller-parameters -configurations: -- ../../../argo/overlays/istio/params.yaml -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../argo/overlays/istio/virtual-service.yaml -- ../../../argo/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/argo/params_0.env b/tests/legacy_kustomizations/argo/params_0.env deleted file mode 100644 index 1a0afc65a6..0000000000 --- a/tests/legacy_kustomizations/argo/params_0.env +++ /dev/null @@ -1,12 +0,0 @@ -namespace=kubeflow -executorImage=argoproj/argoexec:v2.3.0 -containerRuntimeExecutor=docker -artifactRepositoryBucket=mlpipeline -artifactRepositoryKeyPrefix=artifacts -artifactRepositoryEndpoint=minio-service.kubeflow:9000 -artifactRepositoryInsecure=true -artifactRepositoryAccessKeySecretName=mlpipeline-minio-artifact -artifactRepositoryAccessKeySecretKey=accesskey -artifactRepositorySecretKeySecretName=mlpipeline-minio-artifact -artifactRepositorySecretKeySecretKey=secretkey -clusterDomain=cluster.local diff --git a/tests/legacy_kustomizations/bootstrap/kustomization.yaml b/tests/legacy_kustomizations/bootstrap/kustomization.yaml deleted file mode 100644 index 89e7461aa7..0000000000 --- a/tests/legacy_kustomizations/bootstrap/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../admission-webhook/bootstrap/base -commonLabels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: config-map -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../admission-webhook/bootstrap/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/bootstrap/params_0.env b/tests/legacy_kustomizations/bootstrap/params_0.env deleted file mode 100644 index 764fb2fbea..0000000000 --- a/tests/legacy_kustomizations/bootstrap/params_0.env +++ /dev/null @@ -1,2 +0,0 @@ -namespace=kubeflow -webhookNamePrefix=admission-webhook- diff --git a/tests/legacy_kustomizations/centraldashboard/kustomization.yaml b/tests/legacy_kustomizations/centraldashboard/kustomization.yaml deleted file mode 100644 index 298c73e829..0000000000 --- a/tests/legacy_kustomizations/centraldashboard/kustomization.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../common/centraldashboard/base -commonLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: parameters -configurations: -- ../../../common/centraldashboard/overlays/istio/params.yaml -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../common/centraldashboard/overlays/istio/virtual-service.yaml -- ../../../common/centraldashboard/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/centraldashboard/params_0.env b/tests/legacy_kustomizations/centraldashboard/params_0.env deleted file mode 100644 index 680214110d..0000000000 --- a/tests/legacy_kustomizations/centraldashboard/params_0.env +++ /dev/null @@ -1,3 +0,0 @@ -clusterDomain=cluster.local -userid-header=X-Goog-Authenticated-User-Email -userid-prefix=accounts.google.com: diff --git a/tests/legacy_kustomizations/cert-manager-crds/kustomization.yaml b/tests/legacy_kustomizations/cert-manager-crds/kustomization.yaml deleted file mode 100644 index 8b80e4cdf8..0000000000 --- a/tests/legacy_kustomizations/cert-manager-crds/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../cert-manager/cert-manager-crds/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: cert-manager -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomization.yaml b/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomization.yaml deleted file mode 100644 index 9a5f0654dd..0000000000 --- a/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../cert-manager/cert-manager-kube-system-resources/base -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: cert-manager-kube-params-parameters -configurations: [] -kind: Kustomization -namespace: kube-system -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/cert-manager-kube-system-resources/params_0.env b/tests/legacy_kustomizations/cert-manager-kube-system-resources/params_0.env deleted file mode 100644 index 29adda1287..0000000000 --- a/tests/legacy_kustomizations/cert-manager-kube-system-resources/params_0.env +++ /dev/null @@ -1 +0,0 @@ -certManagerNamespace=cert-manager diff --git a/tests/legacy_kustomizations/cert-manager/kustomization.yaml b/tests/legacy_kustomizations/cert-manager/kustomization.yaml deleted file mode 100644 index 728e083328..0000000000 --- a/tests/legacy_kustomizations/cert-manager/kustomization.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../cert-manager/cert-manager/base -commonLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: cert-manager-parameters -configurations: -- ../../../cert-manager/cert-manager/overlays/application/params.yaml -kind: Kustomization -namespace: cert-manager -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../cert-manager/cert-manager/overlays/self-signed/cluster-issuer.yaml -- ../../../cert-manager/cert-manager/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/cert-manager/params_0.env b/tests/legacy_kustomizations/cert-manager/params_0.env deleted file mode 100644 index b29ab79f46..0000000000 --- a/tests/legacy_kustomizations/cert-manager/params_0.env +++ /dev/null @@ -1 +0,0 @@ -namespace=cert-manager diff --git a/tests/legacy_kustomizations/cloud-endpoints/kustomization.yaml b/tests/legacy_kustomizations/cloud-endpoints/kustomization.yaml deleted file mode 100644 index b6e31116e5..0000000000 --- a/tests/legacy_kustomizations/cloud-endpoints/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../gcp/cloud-endpoints/base -commonLabels: - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: cloud-endpoints-parameters -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../gcp/cloud-endpoints/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/cloud-endpoints/params_0.env b/tests/legacy_kustomizations/cloud-endpoints/params_0.env deleted file mode 100644 index 53ba6bd1ed..0000000000 --- a/tests/legacy_kustomizations/cloud-endpoints/params_0.env +++ /dev/null @@ -1,2 +0,0 @@ -namespace=kubeflow -secretName=admin-gcp-sa diff --git a/tests/legacy_kustomizations/default-install/kustomization.yaml b/tests/legacy_kustomizations/default-install/kustomization.yaml deleted file mode 100644 index d6693e0da1..0000000000 --- a/tests/legacy_kustomizations/default-install/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../default-install/base -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: default-install-config -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/default-install/params_0.env b/tests/legacy_kustomizations/default-install/params_0.env deleted file mode 100644 index 2be5698abd..0000000000 --- a/tests/legacy_kustomizations/default-install/params_0.env +++ /dev/null @@ -1,2 +0,0 @@ -user=jlewi@google.com -profile-name=kubeflow-jlewi diff --git a/tests/legacy_kustomizations/gpu-driver/kustomization.yaml b/tests/legacy_kustomizations/gpu-driver/kustomization.yaml deleted file mode 100644 index ca48f8bde2..0000000000 --- a/tests/legacy_kustomizations/gpu-driver/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../gcp/gpu-driver/base -commonLabels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../gcp/gpu-driver/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/iap-ingress/kustomization.yaml b/tests/legacy_kustomizations/iap-ingress/kustomization.yaml deleted file mode 100644 index 313b1a3c5b..0000000000 --- a/tests/legacy_kustomizations/iap-ingress/kustomization.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../gcp/iap-ingress/base -commonLabels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: parameters -configurations: [] -kind: Kustomization -namespace: istio-system -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../gcp/iap-ingress/overlays/managed-cert/cert.yaml -- ../../../gcp/iap-ingress/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/iap-ingress/params_0.env b/tests/legacy_kustomizations/iap-ingress/params_0.env deleted file mode 100644 index 363d2dcd29..0000000000 --- a/tests/legacy_kustomizations/iap-ingress/params_0.env +++ /dev/null @@ -1,10 +0,0 @@ -namespace=istio-system -appName=kf-v1-0210 -hostname=kf-v1-0210.endpoints.jlewi-dev.cloud.goog -ingressName=envoy-ingress -ipName=kf-v1-0210-ip -oauthSecretName=kubeflow-oauth -project=jlewi-dev -adminSaSecretName=admin-gcp-sa -tlsSecretName=envoy-ingress-tls -istioNamespace=istio-system diff --git a/tests/legacy_kustomizations/istio-crds/kustomization.yaml b/tests/legacy_kustomizations/istio-crds/kustomization.yaml deleted file mode 100644 index ffff8ae691..0000000000 --- a/tests/legacy_kustomizations/istio-crds/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../istio/istio-crds/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: istio-system -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/istio-install/kustomization.yaml b/tests/legacy_kustomizations/istio-install/kustomization.yaml deleted file mode 100644 index 641c092f94..0000000000 --- a/tests/legacy_kustomizations/istio-install/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../istio/istio-install/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: istio-system -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/istio/kustomization.yaml b/tests/legacy_kustomizations/istio/kustomization.yaml deleted file mode 100644 index a6a13a035a..0000000000 --- a/tests/legacy_kustomizations/istio/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../istio/istio/base -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: istio-parameters -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/istio/params_0.env b/tests/legacy_kustomizations/istio/params_0.env deleted file mode 100644 index 5daead4bad..0000000000 --- a/tests/legacy_kustomizations/istio/params_0.env +++ /dev/null @@ -1,2 +0,0 @@ -clusterRbacConfig=ON -gatewaySelector=ingressgateway diff --git a/tests/legacy_kustomizations/jupyter-web-app/kustomization.yaml b/tests/legacy_kustomizations/jupyter-web-app/kustomization.yaml deleted file mode 100644 index e9acc251c9..0000000000 --- a/tests/legacy_kustomizations/jupyter-web-app/kustomization.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../jupyter/jupyter-web-app/base -- ../../../jupyter/jupyter-web-app/overlays/istio -commonLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: parameters -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../jupyter/jupyter-web-app/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/jupyter-web-app/params_0.env b/tests/legacy_kustomizations/jupyter-web-app/params_0.env deleted file mode 100644 index ab72ca6b02..0000000000 --- a/tests/legacy_kustomizations/jupyter-web-app/params_0.env +++ /dev/null @@ -1,7 +0,0 @@ -UI=default -ROK_SECRET_NAME=secret-rok-{username} -policy=Always -prefix=jupyter -clusterDomain=cluster.local -userid-header=X-Goog-Authenticated-User-Email -userid-prefix=accounts.google.com: diff --git a/tests/legacy_kustomizations/katib-controller/kustomization.yaml b/tests/legacy_kustomizations/katib-controller/kustomization.yaml deleted file mode 100644 index daa020a614..0000000000 --- a/tests/legacy_kustomizations/katib-controller/kustomization.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../katib/katib-controller/base -commonLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: katib-parameters -configurations: -- ../../../katib/katib-controller/overlays/istio/params.yaml -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../katib/katib-controller/overlays/application/application.yaml -- ../../../katib/katib-controller/overlays/istio/katib-ui-virtual-service.yaml diff --git a/tests/legacy_kustomizations/katib-controller/params_0.env b/tests/legacy_kustomizations/katib-controller/params_0.env deleted file mode 100644 index bdd6604e95..0000000000 --- a/tests/legacy_kustomizations/katib-controller/params_0.env +++ /dev/null @@ -1 +0,0 @@ -clusterDomain=cluster.local diff --git a/tests/legacy_kustomizations/katib-crds/kustomization.yaml b/tests/legacy_kustomizations/katib-crds/kustomization.yaml deleted file mode 100644 index 216f1dab93..0000000000 --- a/tests/legacy_kustomizations/katib-crds/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../katib/katib-crds/base -commonLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../katib/katib-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/kfserving-crds/kustomization.yaml b/tests/legacy_kustomizations/kfserving-crds/kustomization.yaml deleted file mode 100644 index 3307851156..0000000000 --- a/tests/legacy_kustomizations/kfserving-crds/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../kfserving/kfserving-crds/base -commonLabels: - app.kubernetes.io/component: kfserving-crds - app.kubernetes.io/instance: kfserving-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../kfserving/kfserving-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/kfserving-install/kustomization.yaml b/tests/legacy_kustomizations/kfserving-install/kustomization.yaml deleted file mode 100644 index 953f5cbdc4..0000000000 --- a/tests/legacy_kustomizations/kfserving-install/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../kfserving/kfserving-install/base -commonLabels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: kfserving-config -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../kfserving/kfserving-install/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/kfserving-install/params_0.env b/tests/legacy_kustomizations/kfserving-install/params_0.env deleted file mode 100644 index ca48d4610f..0000000000 --- a/tests/legacy_kustomizations/kfserving-install/params_0.env +++ /dev/null @@ -1 +0,0 @@ -registry=gcr.io/kfserving diff --git a/tests/legacy_kustomizations/knative-crds/kustomization.yaml b/tests/legacy_kustomizations/knative-crds/kustomization.yaml deleted file mode 100644 index 3c2dbbe36e..0000000000 --- a/tests/legacy_kustomizations/knative-crds/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../knative/knative-serving-crds/base -commonLabels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: knative-serving -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../knative/knative-serving-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/knative-eventing-crds/kustomization.yaml b/tests/legacy_kustomizations/knative-eventing-crds/kustomization.yaml deleted file mode 100644 index af93709067..0000000000 --- a/tests/legacy_kustomizations/knative-eventing-crds/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../knative/knative-eventing-crds/base -commonLabels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: knative-eventing -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../knative/knative-eventing-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/knative-eventing-install/kustomization.yaml b/tests/legacy_kustomizations/knative-eventing-install/kustomization.yaml deleted file mode 100644 index 7487521717..0000000000 --- a/tests/legacy_kustomizations/knative-eventing-install/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../knative/knative-eventing-install/base -commonLabels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: knative-eventing -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../knative/knative-eventing-install/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/knative-install/kustomization.yaml b/tests/legacy_kustomizations/knative-install/kustomization.yaml deleted file mode 100644 index 804b4fa6be..0000000000 --- a/tests/legacy_kustomizations/knative-install/kustomization.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../knative/knative-serving-install/base -commonLabels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: knative-serving -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../knative/knative-serving-install/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/kubeflow-roles/kustomization.yaml b/tests/legacy_kustomizations/kubeflow-roles/kustomization.yaml deleted file mode 100644 index 0f740c90cd..0000000000 --- a/tests/legacy_kustomizations/kubeflow-roles/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../kubeflow-roles/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/metacontroller/kustomization.yaml b/tests/legacy_kustomizations/metacontroller/kustomization.yaml deleted file mode 100644 index bc2322948a..0000000000 --- a/tests/legacy_kustomizations/metacontroller/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../metacontroller/base -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: [] diff --git a/tests/legacy_kustomizations/metadata/kustomization.yaml b/tests/legacy_kustomizations/metadata/kustomization.yaml deleted file mode 100644 index 041b251a0d..0000000000 --- a/tests/legacy_kustomizations/metadata/kustomization.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../metadata/base -commonLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: ui-parameters -- behavior: merge - envs: - - params_1.env - name: grpc-configmap -configurations: -- ../../../metadata/overlays/istio/params.yaml -generatorOptions: - disableNameSuffixHash: true -images: -- name: mysql - newName: mysql - newTag: 8.0.3 -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: -- ../../../metadata/overlays/db/metadata-deployment.yaml -resources: -- ../../../metadata/overlays/istio/virtual-service-metadata-grpc.yaml -- ../../../metadata/overlays/application/application.yaml -- ../../../metadata/overlays/db/metadata-db-pvc.yaml -- ../../../metadata/overlays/db/metadata-db-deployment.yaml -- ../../../metadata/overlays/db/metadata-db-service.yaml -vars: -- fieldref: - fieldPath: metadata.name - name: metadata-db-service - objref: - apiVersion: v1 - kind: Service - name: metadata-db diff --git a/tests/legacy_kustomizations/metadata/params_0.env b/tests/legacy_kustomizations/metadata/params_0.env deleted file mode 100644 index def9236f86..0000000000 --- a/tests/legacy_kustomizations/metadata/params_0.env +++ /dev/null @@ -1 +0,0 @@ -uiClusterDomain=cluster.local diff --git a/tests/legacy_kustomizations/metadata/params_1.env b/tests/legacy_kustomizations/metadata/params_1.env deleted file mode 100644 index ce915f8855..0000000000 --- a/tests/legacy_kustomizations/metadata/params_1.env +++ /dev/null @@ -1,2 +0,0 @@ -METADATA_GRPC_SERVICE_HOST=metadata-grpc-service -METADATA_GRPC_SERVICE_PORT=8080 \ No newline at end of file diff --git a/tests/legacy_kustomizations/notebook-controller/kustomization.yaml b/tests/legacy_kustomizations/notebook-controller/kustomization.yaml deleted file mode 100644 index 2397c83760..0000000000 --- a/tests/legacy_kustomizations/notebook-controller/kustomization.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../jupyter/notebook-controller/base -commonLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: parameters -configurations: [] -generatorOptions: - disableNameSuffixHash: true -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: -- ../../../jupyter/notebook-controller/overlays/istio/deployment.yaml -resources: -- ../../../jupyter/notebook-controller/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/notebook-controller/params_0.env b/tests/legacy_kustomizations/notebook-controller/params_0.env deleted file mode 100644 index b746a4fd4f..0000000000 --- a/tests/legacy_kustomizations/notebook-controller/params_0.env +++ /dev/null @@ -1,3 +0,0 @@ -POD_LABELS=gcp-cred-secret=user-gcp-sa,gcp-cred-secret-filename=user-gcp-sa.json -USE_ISTIO=false -ISTIO_GATEWAY=kubeflow/kubeflow-gateway diff --git a/tests/legacy_kustomizations/persistent-agent/kustomization.yaml b/tests/legacy_kustomizations/persistent-agent/kustomization.yaml deleted file mode 100644 index 26ec477227..0000000000 --- a/tests/legacy_kustomizations/persistent-agent/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/persistent-agent/base -commonLabels: - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/persistent-agent/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/pipeline-visualization-service/kustomization.yaml b/tests/legacy_kustomizations/pipeline-visualization-service/kustomization.yaml deleted file mode 100644 index 463b2d1a10..0000000000 --- a/tests/legacy_kustomizations/pipeline-visualization-service/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/pipeline-visualization-service/base -commonLabels: - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/pipeline-visualization-service/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/pipelines-runner/kustomization.yaml b/tests/legacy_kustomizations/pipelines-runner/kustomization.yaml deleted file mode 100644 index aef5d41300..0000000000 --- a/tests/legacy_kustomizations/pipelines-runner/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/pipelines-runner/base -commonLabels: - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/pipelines-runner/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/pipelines-ui/kustomization.yaml b/tests/legacy_kustomizations/pipelines-ui/kustomization.yaml deleted file mode 100644 index 31242903c3..0000000000 --- a/tests/legacy_kustomizations/pipelines-ui/kustomization.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/pipelines-ui/base -commonLabels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: ui-parameters -configurations: -- ../../../pipeline/pipelines-ui/overlays/istio/params.yaml -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: -- ../../../pipeline/pipelines-ui/overlays/gcp/deployment.yaml -resources: -- ../../../pipeline/pipelines-ui/overlays/istio/virtual-service.yaml -- ../../../pipeline/pipelines-ui/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/pipelines-ui/params_0.env b/tests/legacy_kustomizations/pipelines-ui/params_0.env deleted file mode 100644 index def9236f86..0000000000 --- a/tests/legacy_kustomizations/pipelines-ui/params_0.env +++ /dev/null @@ -1 +0,0 @@ -uiClusterDomain=cluster.local diff --git a/tests/legacy_kustomizations/pipelines-viewer/kustomization.yaml b/tests/legacy_kustomizations/pipelines-viewer/kustomization.yaml deleted file mode 100644 index 7884ba8066..0000000000 --- a/tests/legacy_kustomizations/pipelines-viewer/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/pipelines-viewer/base -commonLabels: - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/pipelines-viewer/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/profiles/kustomization.yaml b/tests/legacy_kustomizations/profiles/kustomization.yaml deleted file mode 100644 index 6b6572d1a6..0000000000 --- a/tests/legacy_kustomizations/profiles/kustomization.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../profiles/base -commonLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: profiles-parameters -configurations: -- ../../../profiles/overlays/istio/params.yaml -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../profiles/overlays/application/application.yaml -- ../../../profiles/overlays/istio/virtual-service.yaml diff --git a/tests/legacy_kustomizations/profiles/params_0.env b/tests/legacy_kustomizations/profiles/params_0.env deleted file mode 100644 index b34b42e1f4..0000000000 --- a/tests/legacy_kustomizations/profiles/params_0.env +++ /dev/null @@ -1,4 +0,0 @@ -admin=jlewi@google.com -gcp-sa=kf-v1-0210-user@jlewi-dev.iam.gserviceaccount.com -userid-header=X-Goog-Authenticated-User-Email -userid-prefix=accounts.google.com: diff --git a/tests/legacy_kustomizations/pytorch-job-crds/kustomization.yaml b/tests/legacy_kustomizations/pytorch-job-crds/kustomization.yaml deleted file mode 100644 index c099258d65..0000000000 --- a/tests/legacy_kustomizations/pytorch-job-crds/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pytorch-job/pytorch-job-crds/base -commonLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pytorch-job/pytorch-job-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/pytorch-operator/kustomization.yaml b/tests/legacy_kustomizations/pytorch-operator/kustomization.yaml deleted file mode 100644 index 2c80daa0a5..0000000000 --- a/tests/legacy_kustomizations/pytorch-operator/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pytorch-job/pytorch-operator/base -commonLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pytorch-job/pytorch-operator/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/scheduledworkflow/kustomization.yaml b/tests/legacy_kustomizations/scheduledworkflow/kustomization.yaml deleted file mode 100644 index 01ee73abbd..0000000000 --- a/tests/legacy_kustomizations/scheduledworkflow/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../pipeline/scheduledworkflow/base -commonLabels: - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../pipeline/scheduledworkflow/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/seldon-core-operator/kustomization.yaml b/tests/legacy_kustomizations/seldon-core-operator/kustomization.yaml deleted file mode 100644 index 034d74b118..0000000000 --- a/tests/legacy_kustomizations/seldon-core-operator/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../seldon/seldon-core-operator/base -commonLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: '1.15' -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../seldon/seldon-core-operator/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/spark-operator/kustomization.yaml b/tests/legacy_kustomizations/spark-operator/kustomization.yaml deleted file mode 100644 index 808b6a4843..0000000000 --- a/tests/legacy_kustomizations/spark-operator/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../spark/spark-operator/base -commonLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../spark/spark-operator/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/spartakus/kustomization.yaml b/tests/legacy_kustomizations/spartakus/kustomization.yaml deleted file mode 100644 index 413c65b70b..0000000000 --- a/tests/legacy_kustomizations/spartakus/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../common/spartakus/base -commonLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: spartakus-config -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../common/spartakus/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/spartakus/params_0.env b/tests/legacy_kustomizations/spartakus/params_0.env deleted file mode 100644 index 4e2158908d..0000000000 --- a/tests/legacy_kustomizations/spartakus/params_0.env +++ /dev/null @@ -1 +0,0 @@ -usageId=6123692046963347097 diff --git a/tests/legacy_kustomizations/tf-job-crds/kustomization.yaml b/tests/legacy_kustomizations/tf-job-crds/kustomization.yaml deleted file mode 100644 index b060457375..0000000000 --- a/tests/legacy_kustomizations/tf-job-crds/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../tf-training/tf-job-crds/base -commonLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../tf-training/tf-job-crds/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/tf-job-operator/kustomization.yaml b/tests/legacy_kustomizations/tf-job-operator/kustomization.yaml deleted file mode 100644 index 0b4669113d..0000000000 --- a/tests/legacy_kustomizations/tf-job-operator/kustomization.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../tf-training/tf-job-operator/base -commonLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: [] -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../tf-training/tf-job-operator/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/webhook/kustomization.yaml b/tests/legacy_kustomizations/webhook/kustomization.yaml deleted file mode 100644 index e917281042..0000000000 --- a/tests/legacy_kustomizations/webhook/kustomization.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -bases: -- ../../../admission-webhook/webhook/base -commonLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 -configMapGenerator: -- behavior: merge - envs: - - params_0.env - name: admission-webhook-parameters -configurations: [] -kind: Kustomization -namespace: kubeflow -patches: [] -patchesStrategicMerge: [] -resources: -- ../../../admission-webhook/webhook/overlays/application/application.yaml diff --git a/tests/legacy_kustomizations/webhook/params_0.env b/tests/legacy_kustomizations/webhook/params_0.env deleted file mode 100644 index 78166431d4..0000000000 --- a/tests/legacy_kustomizations/webhook/params_0.env +++ /dev/null @@ -1 +0,0 @@ -namespace=kubeflow diff --git a/tests/scripts/extract_images.py b/tests/scripts/extract_images.py deleted file mode 100644 index 6b3e55d024..0000000000 --- a/tests/scripts/extract_images.py +++ /dev/null @@ -1,151 +0,0 @@ -import logging as log - -from sys import argv -from ruamel.yaml import YAML -from collections import Mapping -from os import path, walk, getcwd - -exclude_dirs = [ - ".github", - "docs", - "hack", - "kfdef", - "plugins", - "tests", -] - -accepted_kinds = [ - "statefulset", "deployment", "daemonSet", "replicaset", "job", "cronjob" -] - - -def image_from_string(img_str): - """Parse a string into an image map""" - - tag = "" - digest = "" - - if ":" not in img_str: - img_str = img_str + ":latest" - - if "@" in img_str: - name, digest = img_str.rsplit("@", 1) - else: - name, tag = img_str.rsplit(":", 1) - - img = {"name": name, "tag": tag, "digest": digest} - return img - - -def append_or_update(img_list, new_img): - for img in img_list: - if img["name"] == new_img["name"]: - img["newName"] = img.get("newName", new_img["name"]) - if img.get("newTag", new_img["tag"]): - img["newTag"] = img.get("newTag", new_img["tag"]) - if img.get("digest", new_img["digest"]): - img["digest"] = img.get("digest", new_img["digest"]) - return - # Image doesn't exist in transformation list - kust_img = {"name": new_img["name"], "newName": new_img["name"]} - if new_img["tag"]: - kust_img["newTag"] = new_img["tag"] - if new_img["digest"]: - kust_img["digest"] = new_img["digest"] - img_list.append(kust_img) - - -def scan_kustomization_for_images(kust_dir): - """Scan kustomization folder and produce a list of images - - Args: - kust_dir (str): Path where the kustomize application resides. - """ - - yaml = YAML() - yaml.block_seq_indent = 0 - - # Load kustomization - with open(path.join(kust_dir, "kustomization.yaml")) as f: - try: - kustomization = yaml.load(f) - except Exception as e: - log.error("Error loading kustomization in %s: %s", kust_dir, e) - raise (e) - - # Get current image list from kustomization - img_list = kustomization.get("images", []) - - # Get local resource files - (_, _, filenames) = next(walk(kust_dir)) - filenames = [ - filename for filename in filenames - if filename != "kustomization.yaml" and filename != "params.yaml" and - filename.endswith(".yaml") - ] - - for filename in filenames: - with open(path.join(kust_dir, filename)) as f: - resources = list(yaml.load_all(f)) - for r in resources: - if not isinstance(r, Mapping): - continue - if r.get("kind", "").lower() in accepted_kinds: - try: - containers = r["spec"]["template"]["spec"]["containers"] - except KeyError: - continue - for c in containers: - try: - img_str = c["image"] - except KeyError: - continue - new_img = image_from_string(img_str) - append_or_update(img_list, new_img) - - if img_list: - kustomization["images"] = img_list - with open(path.join(kust_dir, "kustomization.yaml"), "w") as f: - yaml.dump(kustomization, f) - - -def check_kustomize_dir(d): - (curr, folders, _) = next(walk(d)) - if len(folders) == 1 and "base" in folders: - return True, [path.join(curr, "base")] - if len(folders) == 2 and "base" in folders and "overlays" in folders: - (_, folders, _) = next(walk(path.join(curr, "overlays"))) - return True, [path.join(curr, "base")] + [path.join(curr, "overlays", f) for f in folders] - return False, [] - - -def get_kustomization_dirs(root): - - def helper(root, dirs): - (curr, folders, _) = next(walk(root)) - (is_kustomize_dir, kust_dirs) = check_kustomize_dir(curr) - if is_kustomize_dir: - dirs.extend(kust_dirs) - return - for f in folders: - if f in exclude_dirs: - continue - helper(path.join(curr, f), dirs) - - res = [] - helper(root, res) - return res - - -if __name__ == "__main__": - log.basicConfig( - level=log.INFO, - format=('%(levelname)s|%(asctime)s' - '|%(pathname)s|%(lineno)d| %(message)s'), - datefmt='%Y-%m-%dT%H:%M:%S', - ) - log.getLogger().setLevel(log.INFO) - - root_dir = getcwd() if len(argv) < 2 else argv[1] - for d in get_kustomization_dirs(root_dir): - scan_kustomization_for_images(d) \ No newline at end of file diff --git a/tests/scripts/requirements.txt b/tests/scripts/requirements.txt deleted file mode 100644 index e8cf5c87e6..0000000000 --- a/tests/scripts/requirements.txt +++ /dev/null @@ -1,2 +0,0 @@ -ruamel.yaml==0.16.5 -ruamel.yaml.clib==0.2.0 \ No newline at end of file diff --git a/tests/scripts/run-tests.sh b/tests/scripts/run-tests.sh deleted file mode 100755 index ac933429a0..0000000000 --- a/tests/scripts/run-tests.sh +++ /dev/null @@ -1,44 +0,0 @@ -#!/bin/bash - -# Copyright 2019 The Kubeflow Authors. -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -# This shell script is used to build an image from our argo workflow - -set -o errexit -set -o nounset -set -o pipefail - -REPO="$(pwd)" - -cd tests - -# the tests depend on kustomize -export PATH=${GOPATH}/bin:/usr/local/go/bin:${PATH} -export GO111MODULE=on -make test - -# Python test for the kustomization images -# TODO(yanniszark): install these in the worker image -# TODO(https://github.com/kubeflow/manifests/issues/449): -# The code below doesn't properly handle the case where digest -# is used. -#pip install -r "${REPO}/tests/scripts/requirements.txt" -#python3 "${REPO}"/tests/scripts/extract_images.py "${REPO}" - -#if [[ `git status --porcelain` ]]; then -# echo "Error: images missing from kustomization files." -# git --no-pager diff -# exit 1 -#fi \ No newline at end of file diff --git a/tests/stacks/aws/application/cert-manager-crds/kustomize_test.go b/tests/stacks/aws/application/cert-manager-crds/kustomize_test.go deleted file mode 100644 index 8afa7102af..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/stacks/aws/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/kustomize_test.go b/tests/stacks/aws/application/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index 1432e509b8..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index d8e47f2a94..0000000000 --- a/tests/stacks/aws/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/stacks/aws/application/cert-manager/kustomize_test.go b/tests/stacks/aws/application/cert-manager/kustomize_test.go deleted file mode 100644 index 37b2714e9e..0000000000 --- a/tests/stacks/aws/application/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 93e06c4304..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 36a2524012..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 21cdee5406..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 09a9cfab99..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index 6ae84bc8c0..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 33ab9729d5..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index 8a116d7b30..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 2a25e06d49..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 6ce5b8e0cc..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index f62a08529b..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index b0d464bfd5..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index ce897a6a3b..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index ad80b32de5..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index fb0a1201cf..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bea275aa9c..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index a276b13742..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index 13b98eeaae..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index d5f2de3e1b..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index bd1d73f13b..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 80792a8f24..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 7ee5331ba6..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bbc5ee440a..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 6a79270953..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index 854ffd11fe..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index 137f15e731..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index b19073be57..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index f40a39080a..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index d0a3fd2d22..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index adb10f9073..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index b25a401652..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index e71b15aaa6..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index 11c24d45c8..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index 882e257d96..0000000000 --- a/tests/stacks/aws/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/kustomize_test.go b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/kustomize_test.go deleted file mode 100644 index 9f9fdef2bc..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway_1_3_1 - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/cluster-local-gateway-1-3-1", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 8192241e3a..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - strategy: - rollingUpdate: - maxSurge: null - maxUnavailable: null - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "false" - - name: ISTIO_META_WORKLOAD_NAME - value: cluster-local-gateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/cluster-local-gateway - image: docker.io/istio/proxyv2:1.3.1 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 5b01c913b8..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml deleted file mode 100644 index 225e1a47db..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-parameters-tbbdb2842d - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway/kustomize_test.go b/tests/stacks/aws/application/cluster-local-gateway/kustomize_test.go deleted file mode 100644 index 4ea77140d5..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/cluster-local-gateway", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 3a8a7a15c9..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,164 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: cluster-local-gateway - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index f412abdb0d..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index 91d90c9dcd..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-local-gateway-istio-system -subjects: -- kind: ServiceAccount - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml deleted file mode 100644 index 225e1a47db..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-parameters-tbbdb2842d - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/aws/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/common/centraldashboard/kustomize_test.go b/tests/stacks/aws/application/common/centraldashboard/kustomize_test.go deleted file mode 100644 index 7fd73d9943..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package centraldashboard - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/aws/application/common/centraldashboard", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 754f9eab51..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index dae2cb2961..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.$(namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index d0a3b92203..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,113 +0,0 @@ -apiVersion: v1 -data: - centraldashboard_links_config.yaml: "apiVersion: v1\ndata:\n links: |-\n {\n - \ \"menuLinks\": [\n {\n \"link\": \"/pipeline/\",\n \"text\": - \"Pipelines\"\n },\n {\n \"link\": \"/jupyter/\",\n \"text\": - \"Notebook Servers\"\n },\n {\n \"link\": \"/katib/\",\n - \ \"text\": \"Katib\"\n }\n ],\n \"externalLinks\": [],\n - \ \"quickLinks\": [\n {\n \"text\": \"Upload a pipeline\",\n - \ \"desc\": \"Pipelines\",\n \"link\": \"/pipeline/\"\n },\n - \ {\n \"text\": \"View all pipeline runs\",\n \"desc\": - \"Pipelines\",\n \"link\": \"/pipeline/#/runs\"\n },\n {\n - \ \"text\": \"Create a new Notebook server\",\n \"desc\": \"Notebook - Servers\",\n \"link\": \"/jupyter/new?namespace=kubeflow\"\n },\n - \ {\n \"text\": \"View Katib Experiments\",\n \"desc\": - \"Katib\",\n \"link\": \"/katib/\"\n }\n ],\n \"documentationItems\": - [\n {\n \"text\": \"Getting Started with Kubeflow\",\n \"desc\": - \"Get your machine-learning workflow up and running on Kubeflow\",\n \"link\": - \"https://www.kubeflow.org/docs/started/getting-started/\"\n },\n {\n - \ \"text\": \"EKS Kubeflow Examples\",\n \"desc\": \"Get your - step-by-step guidance for Kubeflow on AWS\",\n \"link\": \"https://github.com/aws-samples/eks-kubeflow-workshop\"\n - \ }, \n {\n \"text\": \"Kubeflow on AWS\",\n \"desc\": - \"Running Kubeflow on Elastic Container Service and Amazon Web Services\",\n \"link\": - \"https://www.kubeflow.org/docs/aws/\"\n },\n {\n \"text\": - \"Requirements for Kubeflow\",\n \"desc\": \"Get more detailed information - about using Kubeflow and its components\",\n \"link\": \"https://www.kubeflow.org/docs/started/requirements/\"\n - \ }\n ]\n }\nkind: ConfigMap\nmetadata:\n name: centraldashboard-links-config\n" - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - annotations: {} - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/aws/application/common/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/application/dex-auth/kustomize_test.go b/tests/stacks/aws/application/dex-auth/kustomize_test.go deleted file mode 100644 index 98e2dc962f..0000000000 --- a/tests/stacks/aws/application/dex-auth/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package dex_auth - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/dex-auth", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml deleted file mode 100644 index 196d4afd84..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: authcodes.dex.coreos.com -spec: - group: dex.coreos.com - names: - kind: AuthCode - listKind: AuthCodeList - plural: authcodes - singular: authcode - scope: Namespaced - version: v1 diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml deleted file mode 100644 index d4d54842cd..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: dex - name: dex - namespace: auth -spec: - replicas: 1 - selector: - matchLabels: - app: dex - template: - metadata: - labels: - app: dex - spec: - containers: - - command: - - dex - - serve - - /etc/dex/cfg/config.yaml - image: quay.io/dexidp/dex:v2.22.0 - name: dex - ports: - - containerPort: 5556 - name: http - volumeMounts: - - mountPath: /etc/dex/cfg - name: config - serviceAccountName: dex - volumes: - - configMap: - items: - - key: config.yaml - path: config.yaml - name: dex - name: config diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml deleted file mode 100644 index 242885f808..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: dex - namespace: auth -spec: - gateways: - - kubeflow/kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /dex/ - route: - - destination: - host: dex.auth.svc.cluster.local - port: - number: 5556 diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml deleted file mode 100644 index d4be922abe..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - name: dex -rules: -- apiGroups: - - dex.coreos.com - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml deleted file mode 100644 index 9cd13936f9..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - name: dex -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: dex -subjects: -- kind: ServiceAccount - name: dex - namespace: auth diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml deleted file mode 100644 index 821e81c340..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - static_email: admin@example.com - static_password_hash: $2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W -kind: ConfigMap -metadata: - name: dex-config - namespace: auth diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml deleted file mode 100644 index 5edf6b7027..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - dex_domain: dex.example.com - issuer: http://dex.auth.svc.cluster.local:5556/dex - namespace: auth - oidc_redirect_uris: '["/login/oidc"]' - static_email: admin@example.com - static_password_hash: $2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W - static_user_id: 08a8684b-db88-4b73-90a9-3cd1661f5466 - static_username: admin -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: dex-parameters - namespace: auth diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml deleted file mode 100644 index 707e1d821f..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -data: - config.yaml: | - issuer: http://dex.auth.svc.cluster.local:5556/dex - storage: - type: kubernetes - config: - inCluster: true - web: - http: 0.0.0.0:5556 - logger: - level: "debug" - format: text - oauth2: - skipApprovalScreen: true - enablePasswordDB: true - staticPasswords: - - email: admin@example.com - hash: $2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W - username: admin - userID: 08a8684b-db88-4b73-90a9-3cd1661f5466 - staticClients: - - id: kubeflow-oidc-authservice - redirectURIs: ["/login/oidc"] - name: 'Dex Login Application' - secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok -kind: ConfigMap -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml deleted file mode 100644 index 6b34cabc07..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: auth diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml deleted file mode 100644 index 3ab9b4542d..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: dex - namespace: auth -spec: - ports: - - name: dex - nodePort: 32000 - port: 5556 - protocol: TCP - targetPort: 5556 - selector: - app: dex - type: NodePort diff --git a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml b/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml deleted file mode 100644 index 084f45058d..0000000000 --- a/tests/stacks/aws/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/kustomize_test.go b/tests/stacks/aws/application/istio-1-3-1-stack/kustomize_test.go deleted file mode 100644 index 71931111b1..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_1_3_1_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/istio-1-3-1-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index d7aa03f87d..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 7edbd19816..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-adapter - kustomize.component: istio-crds - package: adapter - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index 7864def1ea..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml deleted file mode 100644 index 1180849525..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: authorizationpolicies.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: AuthorizationPolicy - plural: authorizationpolicies - singular: authorizationpolicy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 2a4631cf5e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 138b667371..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index f0e7d55b9d..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 6a7257c6db..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 00470c08e2..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index d3560e8cbb..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index 787adcd33c..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index d08bd06c40..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-handler - kustomize.component: istio-crds - package: handler - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 5efdd1c1bd..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index f3c47edcf6..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 106fb5f240..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-instance - kustomize.component: istio-crds - package: instance - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index 18ab2ea4c9..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 8acfb192f2..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 796c9fa8e6..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index 7f6d447e54..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index cf34ff9565..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 782ac3f591..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 420974db07..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index e57f11c367..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index e52b86065a..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index bb19b9a158..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index f8b6e02a93..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index dcb1f2185e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 57df1e0445..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-template - kustomize.component: istio-crds - package: template - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index 26e9eb1a10..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml deleted file mode 100644 index ac07dec74a..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app: nodeagent - istio: nodeagent - name: istio-nodeagent - namespace: istio-system -spec: - selector: - matchLabels: - istio: nodeagent - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: nodeagent - istio: nodeagent - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: CA_ADDR - value: istio-citadel:8060 - - name: CA_PROVIDER - value: Citadel - - name: PLUGINS - value: "" - - name: VALID_TOKEN - value: "true" - - name: TRUST_DOMAIN - value: "" - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/istio-release/node-agent-k8s:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: nodeagent - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - serviceAccountName: istio-nodeagent-service-account - tolerations: - - effect: NoExecute - operator: Exists - - effect: NoSchedule - operator: Exists - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 71d2e3470e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: citadel - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - istio: citadel - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --sds-enabled=true - - --append-dns-names=true - - --grpc-port=8060 - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - - --workload-cert-ttl=2160h - env: - - name: CITADEL_ENABLE_NAMESPACES_BY_DEFAULT - value: "true" - image: gcr.io/istio-release/citadel:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 5b344bf192..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: galley - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - istio: galley - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=false - - --validation-webhook-config-file - - /etc/config/validating-webhook-configuration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - image: gcr.io/istio-release/galley:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 61171d41be..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - istio: ingressgateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - MUTUAL_TLS - - --discoveryAddress - - istio-pilot:15011 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "true" - - name: ISTIO_META_WORKLOAD_NAME - value: istio-ingressgateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/istio-ingressgateway - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 2287dd6a98..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - istio: pilot - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "1" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_OUTBOUND - value: "true" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_INBOUND - value: "false" - image: gcr.io/istio-release/pilot:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - requests: - cpu: 500m - memory: 2048Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - serviceAccountName: istio-pilot-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 27069e1098..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - istio: mixer - istio-mixer-type: policy - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --useTemplateCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index c2ef009a0f..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,117 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: sidecar-injector - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: gcr.io/istio-release/sidecar_injector:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - - key: values - path: values - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index dc32c6d0e8..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --certFile=/etc/certs/cert-chain.pem - - --keyFile=/etc/certs/key.pem - - --caCertFile=/etc/certs/root-cert.pem - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 4800m - memory: 4G - requests: - cpu: 1000m - memory: 1G - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index bd61a789cb..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yaml - image: docker.io/prom/prometheus:v2.8.0 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index b11d522036..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 5c0aeb158b..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index 96d1bb443e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index f8de3ad33a..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml deleted file mode 100644 index bc3e9b5c7e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - labels: - app: security - name: istio-security-post-install-release-1.3-latest-daily - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/istio-security-run.sh - - /tmp/security/istio-security-custom-resources.yaml - image: gcr.io/istio-release/kubectl:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index 194c9f3e74..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.proxy_version: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 2b48f38df5..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 6eb5203232..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 591f65ede8..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,213 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml deleted file mode 100644 index def828bfeb..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: attributes - namespace: istio-system -spec: - attributeBindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - compiledTemplate: kubernetes - params: - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml deleted file mode 100644 index d36350d7ce..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestcount - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml deleted file mode 100644 index e8e7f5cae8..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestduration - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml deleted file mode 100644 index 92a052306a..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestsize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml deleted file mode 100644 index 8fa51f640f..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: responsesize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml deleted file mode 100644 index 17059fe110..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytereceived - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml deleted file mode 100644 index 2916bd6d5c..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytesent - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml deleted file mode 100644 index a11ed65696..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsclosed - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml deleted file mode 100644 index a54cf0fefc..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsopened - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 4f64a20efa..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 1bf9b97a14..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount - - requestduration - - requestsize - - responsesize - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) && (match((request.useragent | "-"), "Prometheus*") - == false) diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index ba53469288..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent - - tcpbytereceived - match: context.protocol == "tcp" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 88b56a9f61..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index d6a57b5eb4..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 359f4d4d82..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes - match: context.protocol == "tcp" diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 6bb534ca87..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index dcc865c1ce..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 504e447036..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 8ab724961f..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 48ef2e374c..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ab4d9b137..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - istio: mixer - istio-mixer-type: policy - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml deleted file mode 100644 index 6b92933e30..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - istio: sidecar-injector diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index af62a9392d..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index b2b648f7bf..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - namespaces - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index b07c27bde8..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index e891d1f64e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 712d854b96..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fba93e72ed..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index e058905249..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 7dcde2e12d..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index f3d3217415..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 356d3081d9..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 0c41554f71..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 3cf724b359..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 416d69e15c..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-nodeagent-istio-system -subjects: -- kind: ServiceAccount - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index eb97384bfa..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index 53b0c9ba50..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index ee14afcdaa..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 0d6ca7e082..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 7516510d7e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml deleted file mode 100644 index ccd2b2092a..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - rules: - - services: - - istio-ingressgateway.istio-system.svc.cluster.local diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml deleted file mode 100644 index 91340ebbb5..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - roleRef: - kind: ServiceRole - name: istio-ingressgateway - subjects: - - user: '*' diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index 81512e2b6c..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,120 +0,0 @@ -apiVersion: v1 -data: - validating-webhook-configuration.yaml: | - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - labels: - app: galley - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - sideEffects: None - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - - adapters - - handlers - - instances - - templates - - zipkins - failurePolicy: Fail - sideEffects: None -kind: ConfigMap -metadata: - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml deleted file mode 100644 index db0e477760..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - name: istio-install-parameters-5kmkd2f29g - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 3e86dfa9f0..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: v1 -data: - istio-security-custom-resources.yaml: | - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - spec: - peers: - - mtls: - mode: PERMISSIVE - istio-security-run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index af6866c735..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,405 +0,0 @@ -apiVersion: v1 -data: - config: |- - policy: enabled - alwaysInjectSelector: - [] - neverInjectSelector: - [] - template: |- - rewriteAppHTTPProbe: {{ valueOrDefault .Values.sidecarInjectorWebhook.rewriteAppHTTPProbe false }} - {{- if or (not .Values.istio_cni.enabled) .Values.global.proxy.enableCoreDump }} - initContainers: - {{ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `NONE` }} - {{- if not .Values.istio_cni.enabled }} - - name: istio-init - {{- if contains "/" .Values.global.proxy_init.image }} - image: "{{ .Values.global.proxy_init.image }}" - {{- else }} - image: "{{ .Values.global.hub }}/{{ .Values.global.proxy_init.image }}:{{ .Values.global.tag }}" - {{- end }} - args: - - "-p" - - "15001" - - "-z" - - "15006" - - "-u" - - 1337 - - "-m" - - "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - - "-i" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - - "-x" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - - "-b" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` `*` }}" - - "-d" - - "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") -}} - - "-o" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{ end -}} - {{ if (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -}} - - "-k" - - "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - {{ end -}} - imagePullPolicy: "{{ .Values.global.imagePullPolicy }}" - {{- if .Values.global.proxy.init.resources }} - resources: - {{ toYaml .Values.global.proxy.init.resources | indent 4 }} - {{- else }} - resources: {} - {{- end }} - securityContext: - runAsUser: 0 - runAsNonRoot: false - capabilities: - add: - - NET_ADMIN - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - restartPolicy: Always - {{- end }} - {{ end -}} - {{- if eq .Values.global.proxy.enableCoreDump true }} - - name: enable-core-dump - args: - - -c - - sysctl -w kernel.core_pattern=/var/lib/istio/core.proxy && ulimit -c unlimited - command: - - /bin/sh - image: {{ $.Values.global.proxy.enableCoreDumpImage }} - imagePullPolicy: IfNotPresent - resources: {} - securityContext: - runAsUser: 0 - runAsNonRoot: false - privileged: true - {{ end }} - {{- end }} - containers: - - name: istio-proxy - {{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}" - {{- else }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.hub }}/{{ .Values.global.proxy.image }}:{{ .Values.global.tag }}" - {{- end }} - ports: - - containerPort: 15090 - protocol: TCP - name: http-envoy-prom - args: - - proxy - - sidecar - - --domain - - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }} - - --configPath - - "{{ .ProxyConfig.ConfigPath }}" - - --binaryPath - - "{{ .ProxyConfig.BinaryPath }}" - - --serviceCluster - {{ if ne "" (index .ObjectMeta.Labels "app") -}} - - "{{ index .ObjectMeta.Labels `app` }}.$(POD_NAMESPACE)" - {{ else -}} - - "{{ valueOrDefault .DeploymentMeta.Name `istio-proxy` }}.{{ valueOrDefault .DeploymentMeta.Namespace `default` }}" - {{ end -}} - - --drainDuration - - "{{ formatDuration .ProxyConfig.DrainDuration }}" - - --parentShutdownDuration - - "{{ formatDuration .ProxyConfig.ParentShutdownDuration }}" - - --discoveryAddress - - "{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}" - {{- if eq .Values.global.proxy.tracer "lightstep" }} - - --lightstepAddress - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAddress }}" - - --lightstepAccessToken - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAccessToken }}" - - --lightstepSecure={{ .ProxyConfig.GetTracing.GetLightstep.GetSecure }} - - --lightstepCacertPath - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }}" - {{- else if eq .Values.global.proxy.tracer "zipkin" }} - - --zipkinAddress - - "{{ .ProxyConfig.GetTracing.GetZipkin.GetAddress }}" - {{- else if eq .Values.global.proxy.tracer "datadog" }} - - --datadogAgentAddress - - "{{ .ProxyConfig.GetTracing.GetDatadog.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.logLevel }} - - --proxyLogLevel={{ .Values.global.proxy.logLevel }} - {{- end}} - {{- if .Values.global.proxy.componentLogLevel }} - - --proxyComponentLogLevel={{ .Values.global.proxy.componentLogLevel }} - {{- end}} - - --dnsRefreshRate - - {{ .Values.global.proxy.dnsRefreshRate }} - - --connectTimeout - - "{{ formatDuration .ProxyConfig.ConnectTimeout }}" - {{- if .Values.global.proxy.envoyStatsd.enabled }} - - --statsdUdpAddress - - "{{ .ProxyConfig.StatsdUdpAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyMetricsService.enabled }} - - --envoyMetricsServiceAddress - - "{{ .ProxyConfig.GetEnvoyMetricsService.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyAccessLogService.enabled }} - - --envoyAccessLogService - - '{{ structToJSON .ProxyConfig.EnvoyAccessLogService }}' - {{- end }} - - --proxyAdminPort - - "{{ .ProxyConfig.ProxyAdminPort }}" - {{ if gt .ProxyConfig.Concurrency 0 -}} - - --concurrency - - "{{ .ProxyConfig.Concurrency }}" - {{ end -}} - - --controlPlaneAuthPolicy - - "{{ annotation .ObjectMeta `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy }}" - {{- if (ne (annotation .ObjectMeta "status.sidecar.istio.io/port" .Values.global.proxy.statusPort) "0") }} - - --statusPort - - "{{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }}" - - --applicationPorts - - "{{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` (applicationPorts .Spec.Containers) }}" - {{- end }} - {{- if .Values.global.trustDomain }} - - --trust-domain={{ .Values.global.trustDomain }} - {{- end }} - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_POD_PORTS - value: |- - [ - {{- range $index1, $c := .Spec.Containers }} - {{- range $index2, $p := $c.Ports }} - {{if or (ne $index1 0) (ne $index2 0)}},{{end}}{{ structToJSON $p }} - {{- end}} - {{- end}} - ] - - name: ISTIO_META_CLUSTER_ID - value: "{{ valueOrDefault .Values.global.multicluster.clusterName `Kubernetes` }}" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - {{- if eq .Values.global.proxy.tracer "datadog" }} - - name: HOST_IP - valueFrom: - fieldRef: - fieldPath: status.hostIP - {{- if isset .ObjectMeta.Annotations `apm.datadoghq.com/env` }} - {{- range $key, $value := fromJSON (index .ObjectMeta.Annotations `apm.datadoghq.com/env`) }} - - name: {{ $key }} - value: "{{ $value }}" - {{- end }} - {{- end }} - {{- end }} - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: {{ $.Values.global.sds.enabled }} - - name: ISTIO_META_INTERCEPTION_MODE - value: "{{ or (index .ObjectMeta.Annotations `sidecar.istio.io/interceptionMode`) .ProxyConfig.InterceptionMode.String }}" - - name: ISTIO_META_INCLUDE_INBOUND_PORTS - value: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (applicationPorts .Spec.Containers) }}" - {{- if .Values.global.network }} - - name: ISTIO_META_NETWORK - value: "{{ .Values.global.network }}" - {{- end }} - {{ if .ObjectMeta.Annotations }} - - name: ISTIO_METAJSON_ANNOTATIONS - value: | - {{ toJSON .ObjectMeta.Annotations }} - {{ end }} - {{ if .ObjectMeta.Labels }} - - name: ISTIO_METAJSON_LABELS - value: | - {{ toJSON .ObjectMeta.Labels }} - {{ end }} - {{- if .DeploymentMeta.Name }} - - name: ISTIO_META_WORKLOAD_NAME - value: {{ .DeploymentMeta.Name }} - {{ end }} - {{- if and .TypeMeta.APIVersion .DeploymentMeta.Name }} - - name: ISTIO_META_OWNER - value: kubernetes://api/{{ .TypeMeta.APIVersion }}/namespaces/{{ valueOrDefault .DeploymentMeta.Namespace `default` }}/{{ toLower .TypeMeta.Kind}}s/{{ .DeploymentMeta.Name }} - {{- end}} - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: ISTIO_BOOTSTRAP_OVERRIDE - value: "/etc/istio/custom-bootstrap/custom_bootstrap.json" - {{- end }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: ISTIO_META_SDS_TOKEN_PATH - value: "{{ .Values.global.sds.customTokenDirectory -}}/sdstoken" - {{- end }} - {{- if .Values.global.meshID }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.meshID }}" - {{- else if .Values.global.trustDomain }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.trustDomain }}" - {{- end }} - imagePullPolicy: {{ .Values.global.imagePullPolicy }} - {{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }} - readinessProbe: - httpGet: - path: /healthz/ready - port: {{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }} - initialDelaySeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` .Values.global.proxy.readinessInitialDelaySeconds }} - periodSeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` .Values.global.proxy.readinessPeriodSeconds }} - failureThreshold: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` .Values.global.proxy.readinessFailureThreshold }} - {{ end -}} - securityContext: - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - {{- if ne .Values.global.proxy.enableCoreDump true }} - readOnlyRootFilesystem: true - {{- end }} - {{ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY` -}} - capabilities: - add: - - NET_ADMIN - runAsGroup: 1337 - {{ else -}} - {{ if .Values.global.sds.enabled }} - runAsGroup: 1337 - {{- end }} - runAsUser: 1337 - {{- end }} - resources: - {{ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - requests: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -}} - cpu: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` }}" - {{ end}} - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - memory: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` }}" - {{ end }} - {{ else -}} - {{- if .Values.global.proxy.resources }} - {{ toYaml .Values.global.proxy.resources | indent 4 }} - {{- end }} - {{ end -}} - volumeMounts: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - mountPath: /etc/istio/custom-bootstrap - name: custom-bootstrap-volume - {{- end }} - - mountPath: /etc/istio/proxy - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - {{- if .Values.global.sds.customTokenDirectory }} - - mountPath: "{{ .Values.global.sds.customTokenDirectory -}}" - name: custom-sds-token - readOnly: true - {{- end }} - {{- else }} - - mountPath: /etc/certs/ - name: istio-certs - readOnly: true - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - mountPath: {{ directory .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }} - name: lightstep-certs - readOnly: true - {{- end }} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` }} - {{ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 4 }} - {{ end }} - {{- end }} - volumes: - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: custom-bootstrap-volume - configMap: - name: {{ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` "" }} - {{- end }} - - emptyDir: - medium: Memory - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - name: sds-uds-path - hostPath: - path: /var/run/sds - - name: istio-token - projected: - sources: - - serviceAccountToken: - path: istio-token - expirationSeconds: 43200 - audience: {{ .Values.global.sds.token.aud }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: custom-sds-token - secret: - secretName: sdstokensecret - {{- end }} - {{- else }} - - name: istio-certs - secret: - optional: true - {{ if eq .Spec.ServiceAccountName "" }} - secretName: istio.default - {{ else -}} - secretName: {{ printf "istio.%s" .Spec.ServiceAccountName }} - {{ end -}} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` }} - {{range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 2 }} - {{ end }} - {{ end }} - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - name: lightstep-certs - secret: - optional: true - secretName: lightstep.cacert - {{- end }} - {{- if .Values.global.podDNSSearchNamespaces }} - dnsConfig: - searches: - {{- range .Values.global.podDNSSearchNamespaces }} - - {{ render . }} - {{- end }} - {{- end }} - podRedirectAnnot: - sidecar.istio.io/interceptionMode: "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - traffic.sidecar.istio.io/includeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - traffic.sidecar.istio.io/excludeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - traffic.sidecar.istio.io/includeInboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (includeInboundPorts .Spec.Containers) }}" - traffic.sidecar.istio.io/excludeInboundPorts: "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") }} - traffic.sidecar.istio.io/excludeOutboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{- end }} - traffic.sidecar.istio.io/kubevirtInterfaces: "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - values: '{"certmanager":{"enabled":false},"galley":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"galley","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"gateways":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"istio-egressgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"labels":{"app":"istio-egressgateway","istio":"egressgateway"},"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"http2","port":80},{"name":"https","port":443},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/egressgateway-certs","name":"egressgateway-certs","secretName":"istio-egressgateway-certs"},{"mountPath":"/etc/istio/egressgateway-ca-certs","name":"egressgateway-ca-certs","secretName":"istio-egressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"ClusterIP"},"istio-ilbgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"labels":{"app":"istio-ilbgateway","istio":"ilbgateway"},"loadBalancerIP":"","nodeSelector":{},"podAnnotations":{},"ports":[{"name":"grpc-pilot-mtls","port":15011},{"name":"grpc-pilot","port":15010},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns","port":5353}],"resources":{"requests":{"cpu":"800m","memory":"512Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/ilbgateway-certs","name":"ilbgateway-certs","secretName":"istio-ilbgateway-certs"},{"mountPath":"/etc/istio/ilbgateway-ca-certs","name":"ilbgateway-ca-certs","secretName":"istio-ilbgateway-ca-certs"}],"serviceAnnotations":{"cloud.google.com/load-balancer-type":"internal"},"tolerations":[],"type":"LoadBalancer"},"istio-ingressgateway":{"applicationPorts":"","autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"externalIPs":[],"labels":{"app":"istio-ingressgateway","istio":"ingressgateway"},"loadBalancerIP":"","loadBalancerSourceRanges":[],"meshExpansionPorts":[{"name":"tcp-pilot-grpc-tls","port":15011,"targetPort":15011},{"name":"tcp-mixer-grpc-tls","port":15004,"targetPort":15004},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns-tls","port":853,"targetPort":853}],"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"status-port","port":15020,"targetPort":15020},{"name":"http2","nodePort":31380,"port":80,"targetPort":80},{"name":"https","nodePort":31390,"port":443},{"name":"tcp","nodePort":31400,"port":31400},{"name":"https-kiali","port":15029,"targetPort":15029},{"name":"https-prometheus","port":15030,"targetPort":15030},{"name":"https-grafana","port":15031,"targetPort":15031},{"name":"https-tracing","port":15032,"targetPort":15032},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sds":{"enabled":false,"image":"node-agent-k8s","resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}},"secretVolumes":[{"mountPath":"/etc/istio/ingressgateway-certs","name":"ingressgateway-certs","secretName":"istio-ingressgateway-certs"},{"mountPath":"/etc/istio/ingressgateway-ca-certs","name":"ingressgateway-ca-certs","secretName":"istio-ingressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"LoadBalancer"}},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"grafana":{"enabled":false},"istio_cni":{"enabled":false},"istiocoredns":{"enabled":false},"kiali":{"enabled":false},"mixer":{"adapters":{"kubernetesenv":{"enabled":true},"prometheus":{"enabled":true,"metricsExpiryDuration":"10m"},"stdio":{"enabled":false,"outputAsJson":true},"useAdapterCRDs":false},"env":{"GODEBUG":"gctrace=1","GOMAXPROCS":"6"},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"mixer","nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"policy":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%"},"telemetry":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"loadshedding":{"latencyThreshold":"100ms","mode":"enforce"},"replicaCount":1,"reportBatchMaxEntries":100,"reportBatchMaxTime":"1s","resources":{"limits":{"cpu":"4800m","memory":"4G"},"requests":{"cpu":"1000m","memory":"1G"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sessionAffinityEnabled":false},"tolerations":[]},"nodeagent":{"enabled":true,"env":{"CA_ADDR":"istio-citadel:8060","CA_PROVIDER":"Citadel","PLUGINS":"","VALID_TOKEN":true},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"node-agent-k8s","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"tolerations":[]},"pilot":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enableProtocolSniffingForInbound":false,"enableProtocolSniffingForOutbound":true,"enabled":true,"env":{"GODEBUG":"gctrace=1","PILOT_PUSH_THROTTLE":100},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"pilot","keepaliveMaxServerConnectionAge":"30m","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"resources":{"requests":{"cpu":"500m","memory":"2048Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sidecar":true,"tolerations":[],"traceSampling":1},"prometheus":{"contextPath":"/prometheus","enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"hub":"docker.io/prom","image":"prometheus","ingress":{"annotations":null,"enabled":false,"hosts":["prometheus.local"],"tls":null},"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"retention":"6h","scrapeInterval":"15s","security":{"enabled":true},"service":{"annotations":{},"nodePort":{"enabled":false,"port":32090}},"tag":"v2.8.0","tolerations":[]},"security":{"citadelHealthCheck":false,"createMeshPolicy":true,"enableNamespacesByDefault":true,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"citadel","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","selfSigned":true,"tolerations":[],"workloadCertTtl":"2160h"},"sidecarInjectorWebhook":{"alwaysInjectSelector":[],"enableNamespacesByDefault":false,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"sidecar_injector","neverInjectSelector":[],"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rewriteAppHTTPProbe":false,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"tracing":{"enabled":false}}' -kind: ConfigMap -metadata: - labels: - app: istio - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index 212eae498f..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: v1 -data: - mesh: |- - # Set the following variable to true to disable policy checks by the Mixer. - # Note that metrics will still be reported to the Mixer. - disablePolicyChecks: true - # reportBatchMaxEntries is the number of requests that are batched before telemetry data is sent to the mixer server - reportBatchMaxEntries: 100 - # reportBatchMaxTime is the max waiting time before the telemetry data of a request is sent to the mixer server - reportBatchMaxTime: 1s - - # Set enableTracing to false to disable request tracing. - enableTracing: true - - # Set accessLogFile to empty string to disable access log. - accessLogFile: "" - - # If accessLogEncoding is TEXT, value will be used directly as the log format - # example: "[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\n" - # If AccessLogEncoding is JSON, value will be parsed as map[string]string - # example: '{"start_time": "%START_TIME%", "req_method": "%REQ(:METHOD)%"}' - # Leave empty to use default log format - accessLogFormat: "" - - # Set accessLogEncoding to JSON or TEXT to configure sidecar access log - accessLogEncoding: 'TEXT' - - enableEnvoyAccessLogService: false - mixerCheckServer: istio-policy.istio-system.svc.cluster.local:15004 - mixerReportServer: istio-telemetry.istio-system.svc.cluster.local:15004 - # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached. - # Default is false which means the traffic is denied when the client is unable to connect to Mixer. - policyCheckFailOpen: false - # Let Pilot give ingresses the public IP of the Istio ingressgateway - ingressService: istio-ingressgateway - - # Default connect timeout for dynamic clusters generated by Pilot and returned via XDS - connectTimeout: 10s - - # Automatic protocol detection uses a set of heuristics to - # determine whether the connection is using TLS or not (on the - # server side), as well as the application protocol being used - # (e.g., http vs tcp). These heuristics rely on the client sending - # the first bits of data. For server first protocols like MySQL, - # MongoDB, etc., Envoy will timeout on the protocol detection after - # the specified period, defaulting to non mTLS plain TCP - # traffic. Set this field to tweak the period that Envoy will wait - # for the client to send the first bits of data. (MUST BE >=1ms) - protocolDetectionTimeout: 100ms - - # DNS refresh rate for Envoy clusters of type STRICT_DNS - dnsRefreshRate: 300s - - # Unix Domain Socket through which envoy communicates with NodeAgent SDS to get - # key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - sdsUdsPath: "unix:/var/run/sds/uds_path" - - # The trust domain corresponds to the trust root of a system. - # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain - trustDomain: "" - - # Set the default behavior of the sidecar for handling outbound traffic from the application: - # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no - # services or ServiceEntries for the destination port - # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well - # as those defined through ServiceEntries - outboundTrafficPolicy: - mode: ALLOW_ANY - localityLbSetting: - enabled: true - # The namespace to treat as the administrative root namespace for istio - # configuration. - rootNamespace: istio-system - configSources: - - address: istio-galley.istio-system.svc:9901 - tlsSettings: - mode: ISTIO_MUTUAL - - defaultConfig: - # - # TCP connection timeout between Envoy & the application, and between Envoys. Used for static clusters - # defined in Envoy's configuration file - connectTimeout: 10s - # - ### ADVANCED SETTINGS ############# - # Where should envoy's configuration be stored in the istio-proxy container - configPath: "/etc/istio/proxy" - binaryPath: "/usr/local/bin/envoy" - # The pseudo service name used for Envoy. - serviceCluster: istio-proxy - # These settings that determine how long an old Envoy - # process should be kept alive after an occasional reload. - drainDuration: 45s - parentShutdownDuration: 1m0s - # - # The mode used to redirect inbound connections to Envoy. This setting - # has no effect on outbound traffic: iptables REDIRECT is always used for - # outbound connections. - # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. - # The "REDIRECT" mode loses source addresses during redirection. - # If "TPROXY", use iptables TPROXY to redirect to Envoy. - # The "TPROXY" mode preserves both the source and destination IP - # addresses and ports, so that they can be used for advanced filtering - # and manipulation. - # The "TPROXY" mode also configures the sidecar to run with the - # CAP_NET_ADMIN capability, which is required to use TPROXY. - #interceptionMode: REDIRECT - # - # Port where Envoy listens (on local host) for admin commands - # You can exec into the istio-proxy container in a pod and - # curl the admin port (curl http://localhost:15000/) to obtain - # diagnostic information from Envoy. See - # https://lyft.github.io/envoy/docs/operations/admin.html - # for more details - proxyAdminPort: 15000 - # - # Set concurrency to a specific number to control the number of Proxy worker threads. - # If set to 0 (default), then start worker thread for each CPU thread/core. - concurrency: 2 - # - tracing: - zipkin: - # Address of the Zipkin collector - address: zipkin.istio-system:9411 - # - # Mutual TLS authentication between sidecars and istio control plane. - controlPlaneAuthPolicy: MUTUAL_TLS - # - # Address where istio Pilot service is running - discoveryAddress: istio-pilot.istio-system:15011 - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index bab14b0984..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,276 +0,0 @@ -apiVersion: v1 -data: - prometheus.yaml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index f394e916f9..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 852fd9feff..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index ea2d39ca12..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index a590dc8ab9..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - type: NodePort diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 7f7aac66b2..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 92eddb06cd..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 2013882d45..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - name: https-inject - port: 443 - - name: http-monitoring - port: 15014 - selector: - istio: sidecar-injector diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index b02397a061..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index 147fda3aac..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index bfd1afc2a9..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index a1fdfb36c4..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index 7d7230c868..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index 9630e83a84..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml deleted file mode 100644 index 74f7f7a736..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: nodeagent - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index 066bd7fa6e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index 26c77ce158..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index 3b225d382e..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 1cb719e1cd..0000000000 --- a/tests/stacks/aws/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-ingress-cognito/kustomize_test.go b/tests/stacks/aws/application/istio-ingress-cognito/kustomize_test.go deleted file mode 100644 index 4df8730e1f..0000000000 --- a/tests/stacks/aws/application/istio-ingress-cognito/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_ingress_cognito - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/istio-ingress-cognito", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/networking.k8s.io_v1beta1_ingress_istio-ingress.yaml b/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/networking.k8s.io_v1beta1_ingress_istio-ingress.yaml deleted file mode 100644 index 9822d18c3b..0000000000 --- a/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/networking.k8s.io_v1beta1_ingress_istio-ingress.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.k8s.io/v1beta1 -kind: Ingress -metadata: - annotations: - alb.ingress.kubernetes.io/auth-idp-cognito: '{"UserPoolArn":"","UserPoolClientId":"", - "UserPoolDomain":""}' - alb.ingress.kubernetes.io/auth-type: cognito - alb.ingress.kubernetes.io/certificate-arn: "" - alb.ingress.kubernetes.io/listen-ports: '[{"HTTPS":443}]' - alb.ingress.kubernetes.io/scheme: internet-facing - kubernetes.io/ingress.class: alb - labels: - kustomize.component: istio-ingress - name: istio-ingress - namespace: istio-system -spec: - rules: - - http: - paths: - - backend: - serviceName: istio-ingressgateway - servicePort: 80 - path: /* diff --git a/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/~g_v1_configmap_istio-ingress-config.yaml b/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/~g_v1_configmap_istio-ingress-config.yaml deleted file mode 100644 index ac79bed4aa..0000000000 --- a/tests/stacks/aws/application/istio-ingress-cognito/test_data/expected/~g_v1_configmap_istio-ingress-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - CognitoAppClientId: "" - CognitoUserPoolArn: "" - CognitoUserPoolDomain: "" - certArn: "" - loadBalancerScheme: internet-facing -kind: ConfigMap -metadata: - labels: - kustomize.component: istio-ingress - name: istio-ingress-config - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/kustomize_test.go b/tests/stacks/aws/application/istio-stack/kustomize_test.go deleted file mode 100644 index 36f8ffe474..0000000000 --- a/tests/stacks/aws/application/istio-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/istio-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index 45f3d51ee0..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - release: istio - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 306a83db93..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: adapter - release: istio - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml deleted file mode 100644 index d0385f0e48..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: apikey - release: istio - name: apikeys.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: apikey - plural: apikeys - singular: apikey - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index b904f823e8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml deleted file mode 100644 index e7f9bb2ca1..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: authorization - release: istio - name: authorizations.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: authorization - plural: authorizations - singular: authorization - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml deleted file mode 100644 index 5d853a10d2..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: bypass - release: istio - name: bypasses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: bypass - plural: bypasses - singular: bypass - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 188a1093cd..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 08e76be423..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml deleted file mode 100644 index f31fc2477e..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: checknothing - release: istio - name: checknothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: checknothing - plural: checknothings - singular: checknothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml deleted file mode 100644 index e5b7194645..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: circonus - release: istio - name: circonuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: circonus - plural: circonuses - singular: circonus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml deleted file mode 100644 index 0c2c35ff0c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: cloudwatch - name: cloudwatches.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: cloudwatch - plural: cloudwatches - singular: cloudwatch - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index dea35ef84c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 366c18ebc7..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - heritage: Tiller - istio: rbac - release: istio - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml deleted file mode 100644 index 9d89ab9c83..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: denier - release: istio - name: deniers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: denier - plural: deniers - singular: denier - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 044b9a80e7..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml deleted file mode 100644 index 3e6d9dc8ef..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: dogstatsd - name: dogstatsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: dogstatsd - plural: dogstatsds - singular: dogstatsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml deleted file mode 100644 index 65099a24de..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: edge - release: istio - name: edges.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: edge - plural: edges - singular: edge - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index ed0739556e..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml deleted file mode 100644 index f3111ccc25..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: fluentd - release: istio - name: fluentds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: fluentd - plural: fluentds - singular: fluentd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index f7420c2f40..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index dab8c75f1b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-handler - package: handler - release: istio - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 1771daadae..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index cbf2f79146..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 9699fa820f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: instance - release: istio - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index a0c186a1d1..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml deleted file mode 100644 index 7b7da141af..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: kubernetesenv - release: istio - name: kubernetesenvs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetesenv - plural: kubernetesenvs - singular: kubernetesenv - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml deleted file mode 100644 index 91693505d6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: adapter.template.kubernetes - release: istio - name: kuberneteses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetes - plural: kuberneteses - singular: kubernetes - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml deleted file mode 100644 index cf59ae38ca..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: listchecker - release: istio - name: listcheckers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listchecker - plural: listcheckers - singular: listchecker - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml deleted file mode 100644 index 04806a76c8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: listentry - release: istio - name: listentries.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listentry - plural: listentries - singular: listentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml deleted file mode 100644 index d1d561e6da..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: logentry - release: istio - name: logentries.config.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.severity - description: The importance of the log entry - name: Severity - type: string - - JSONPath: .spec.timestamp - description: The time value for the log entry - name: Timestamp - type: string - - JSONPath: .spec.monitored_resource_type - description: Optional expression to compute the type of the monitored resource - this log entry is being recorded on - name: Res Type - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: logentry - plural: logentries - singular: logentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml deleted file mode 100644 index c36d6a5e64..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: memquota - release: istio - name: memquotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: memquota - plural: memquotas - singular: memquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 56fcaeb04d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml deleted file mode 100644 index 19a4a519c0..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: metric - release: istio - name: metrics.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: metric - plural: metrics - singular: metric - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml deleted file mode 100644 index c8cadbd41e..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: noop - release: istio - name: noops.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: noop - plural: noops - singular: noop - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml deleted file mode 100644 index 9368360492..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: opa - release: istio - name: opas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: opa - plural: opas - singular: opa - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 06d5359def..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index b9933dfd96..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml deleted file mode 100644 index 07d9e146fc..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: prometheus - release: istio - name: prometheuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: prometheus - plural: prometheuses - singular: prometheus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml deleted file mode 100644 index df929bfdd9..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: quota - release: istio - name: quotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: quota - plural: quotas - singular: quota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index 7434f2f66d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 53d48ab742..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 7883b0d7c3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml deleted file mode 100644 index a197d882a7..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: rbac - release: istio - name: rbacs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rbac - plural: rbacs - singular: rbac - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml deleted file mode 100644 index 15158d0df6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: redisquota - release: istio - name: redisquotas.config.istio.io -spec: - group: config.istio.io - names: - kind: redisquota - plural: redisquotas - singular: redisquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml deleted file mode 100644 index 899806b3a6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: reportnothing - release: istio - name: reportnothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: reportnothing - plural: reportnothings - singular: reportnothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index 40b5a703e5..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index db8fa18cb8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index 6228a334b0..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index 24d78ee506..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index 059355b082..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml deleted file mode 100644 index dfe2f4c61e..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: signalfx - release: istio - name: signalfxs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: signalfx - plural: signalfxs - singular: signalfx - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml deleted file mode 100644 index 6b758b40d9..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: solarwinds - release: istio - name: solarwindses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: solarwinds - plural: solarwindses - singular: solarwinds - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml deleted file mode 100644 index c3e9b39dcd..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stackdriver - release: istio - name: stackdrivers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stackdriver - plural: stackdrivers - singular: stackdriver - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml deleted file mode 100644 index 7b3da3e069..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: statsd - release: istio - name: statsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: statsd - plural: statsds - singular: statsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml deleted file mode 100644 index 1918fa9b19..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stdio - release: istio - name: stdios.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stdio - plural: stdios - singular: stdio - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 60c365f949..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-template - package: template - release: istio - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml deleted file mode 100644 index 677ffc60bb..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: tracespan - release: istio - name: tracespans.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: tracespan - plural: tracespans - singular: tracespan - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index fa7f9a0d80..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml deleted file mode 100644 index cfd1f91152..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: zipkin - name: zipkins.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: zipkin - plural: zipkins - singular: zipkin - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml deleted file mode 100644 index b4fba3181f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml +++ /dev/null @@ -1,152 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: GRAFANA_PORT - value: "3000" - - name: GF_AUTH_BASIC_ENABLED - value: "false" - - name: GF_AUTH_ANONYMOUS_ENABLED - value: "true" - - name: GF_AUTH_ANONYMOUS_ORG_ROLE - value: Admin - - name: GF_PATHS_DATA - value: /data/grafana - image: grafana/grafana:6.0.2 - imagePullPolicy: IfNotPresent - name: grafana - ports: - - containerPort: 3000 - readinessProbe: - httpGet: - path: /login - port: 3000 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /data/grafana - name: data - - mountPath: /var/lib/grafana/dashboards/istio/galley-dashboard.json - name: dashboards-istio-galley-dashboard - readOnly: true - subPath: galley-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-mesh-dashboard.json - name: dashboards-istio-istio-mesh-dashboard - readOnly: true - subPath: istio-mesh-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-performance-dashboard.json - name: dashboards-istio-istio-performance-dashboard - readOnly: true - subPath: istio-performance-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-service-dashboard.json - name: dashboards-istio-istio-service-dashboard - readOnly: true - subPath: istio-service-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-workload-dashboard.json - name: dashboards-istio-istio-workload-dashboard - readOnly: true - subPath: istio-workload-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/mixer-dashboard.json - name: dashboards-istio-mixer-dashboard - readOnly: true - subPath: mixer-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/pilot-dashboard.json - name: dashboards-istio-pilot-dashboard - readOnly: true - subPath: pilot-dashboard.json - - mountPath: /etc/grafana/provisioning/datasources/datasources.yaml - name: config - subPath: datasources.yaml - - mountPath: /etc/grafana/provisioning/dashboards/dashboardproviders.yaml - name: config - subPath: dashboardproviders.yaml - securityContext: - fsGroup: 472 - runAsUser: 472 - volumes: - - configMap: - name: istio-grafana - name: config - - emptyDir: {} - name: data - - configMap: - name: istio-grafana-configuration-dashboards-galley-dashboard - name: dashboards-istio-galley-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - name: dashboards-istio-istio-mesh-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - name: dashboards-istio-istio-performance-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-service-dashboard - name: dashboards-istio-istio-service-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - name: dashboards-istio-istio-workload-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-mixer-dashboard - name: dashboards-istio-mixer-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-pilot-dashboard - name: dashboards-istio-pilot-dashboard diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 8cf48324fd..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --append-dns-names=true - - --grpc-port=8060 - - --grpc-hostname=citadel - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - image: docker.io/istio/citadel:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml deleted file mode 100644 index 82a3fce5a3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml +++ /dev/null @@ -1,171 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-egressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-certs - name: egressgateway-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-ca-certs - name: egressgateway-ca-certs - readOnly: true - serviceAccountName: istio-egressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-egressgateway-service-account - - name: egressgateway-certs - secret: - optional: true - secretName: istio-egressgateway-certs - - name: egressgateway-ca-certs - secret: - optional: true - secretName: istio-egressgateway-ca-certs diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 9bdf1a9c23..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=true - - --validation-webhook-config-file - - /etc/config/validatingwebhookconfiguration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - - --enable-validation=true - image: docker.io/istio/galley:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 01d4547b36..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,177 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 3eaa8c4269..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "100" - - name: PILOT_DISABLE_XDS_MARSHALING_TO_ANY - value: "1" - image: docker.io/istio/pilot:1.1.6 - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - limits: - cpu: 100m - memory: 200Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - serviceAccountName: istio-pilot-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 204884f48a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,168 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index a7d7af79d5..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: docker.io/istio/sidecar_injector:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index e848f4ba90..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,172 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 50m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml deleted file mode 100644 index a67c51e985..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml +++ /dev/null @@ -1,99 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: istio-tracing - namespace: istio-system -spec: - selector: - matchLabels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - template: - metadata: - annotations: - prometheus.io/path: /jaeger/metrics - prometheus.io/port: "16686" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: COLLECTOR_ZIPKIN_HTTP_PORT - value: "9411" - - name: MEMORY_MAX_TRACES - value: "50000" - - name: QUERY_BASE_PATH - value: /jaeger - image: docker.io/jaegertracing/all-in-one:1.9 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: / - port: 16686 - name: jaeger - ports: - - containerPort: 9411 - - containerPort: 16686 - - containerPort: 5775 - protocol: UDP - - containerPort: 6831 - protocol: UDP - - containerPort: 6832 - protocol: UDP - readinessProbe: - httpGet: - path: / - port: 16686 - resources: - requests: - cpu: 10m diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml deleted file mode 100644 index 6bbccb9b25..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: kiali - template: - metadata: - annotations: - prometheus.io/port: "9090" - prometheus.io/scrape: "true" - scheduler.alpha.kubernetes.io/critical-pod: "" - sidecar.istio.io/inject: "false" - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /opt/kiali/kiali - - -config - - /kiali-configuration/config.yaml - - -v - - "4" - env: - - name: ACTIVE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: PROMETHEUS_SERVICE_URL - value: http://prometheus:9090 - - name: SERVER_WEB_ROOT - value: /kiali - image: docker.io/kiali/kiali:v0.16 - name: kiali - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /kiali-configuration - name: kiali-configuration - - mountPath: /kiali-secret - name: kiali-secret - serviceAccountName: kiali-service-account - volumes: - - configMap: - name: kiali - name: kiali-configuration - - name: kiali-secret - secret: - optional: true - secretName: kiali diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index 613cd2fe17..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,93 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yml - image: docker.io/prom/prometheus:v2.3.1 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml deleted file mode 100644 index cdbeef32e3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-egressgateway diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index c5a6bdd2d8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 1c3bd0a78a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index f33a22eeca..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index 8fc6b67d67..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml deleted file mode 100644 index e3cf64d5b2..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "3" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - -c - - | - kubectl get secret --all-namespaces | grep "istio.io/key-and-cert" | while read -r entry; do - ns=$(echo $entry | awk '{print $1}'); - name=$(echo $entry | awk '{print $2}'); - kubectl delete secret $name -n $ns; - done - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - restartPolicy: OnFailure - serviceAccountName: istio-cleanup-secrets-service-account diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml deleted file mode 100644 index 79d95f8258..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: istio-grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/grafana/run.sh - - /tmp/grafana/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - name: kubectl - volumeMounts: - - mountPath: /tmp/grafana - name: tmp-configmap-grafana - restartPolicy: OnFailure - serviceAccountName: istio-grafana-post-install-account - volumes: - - configMap: - name: istio-grafana-custom-resources - name: tmp-configmap-grafana diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml deleted file mode 100644 index f907dee1af..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/run.sh - - /tmp/security/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index d475e6bc55..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,138 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 6b39cc0347..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 41928afff6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv - params: null diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 7558b99229..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,216 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml deleted file mode 100644 index 2baf4e9096..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - compiledAdapter: stdio - params: - outputAsJson: true diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml deleted file mode 100644 index 1e66576783..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: kubernetes -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: attributes - namespace: istio-system -spec: - attribute_bindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml deleted file mode 100644 index c4098d4e17..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: accesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: request.time - variables: - apiClaims: request.auth.raw_claims | "" - apiKey: request.api_key | request.headers["x-api-key"] | "" - clientTraceId: request.headers["x-client-trace-id"] | "" - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - grpcMessage: response.grpc_message | "" - grpcStatus: response.grpc_status | "" - httpAuthority: request.headers[":authority"] | request.host | "" - latency: response.duration | "0ms" - method: request.method | "" - permissiveResponseCode: rbac.permissive.response_code | "none" - permissiveResponsePolicyID: rbac.permissive.effective_policy_id | "none" - protocol: request.scheme | context.protocol | "http" - receivedBytes: request.total_size | 0 - referer: request.referer | "" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestId: request.headers["x-request-id"] | "" - requestSize: request.size | 0 - requestedServerName: connection.requested_server_name | "" - responseCode: response.code | 0 - responseFlags: context.proxy_error_code | "" - responseSize: response.size | 0 - responseTimestamp: response.time - sentBytes: response.total_size | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - url: request.path | "" - userAgent: request.useragent | "" - xForwardedFor: request.headers["x-forwarded-for"] | "0.0.0.0" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml deleted file mode 100644 index 797b01697d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpaccesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: context.time | timestamp("2017-01-01T00:00:00Z") - variables: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - connectionDuration: connection.duration | "0ms" - connectionEvent: connection.event | "" - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - protocol: context.protocol | "tcp" - receivedBytes: connection.received.bytes | 0 - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestedServerName: connection.requested_server_name | "" - responseFlags: context.proxy_error_code | "" - sentBytes: connection.sent.bytes | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - totalReceivedBytes: connection.received.bytes_total | 0 - totalSentBytes: connection.sent.bytes_total | 0 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml deleted file mode 100644 index 5aa199b236..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestcount - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml deleted file mode 100644 index 914e4d4b5a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestduration - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml deleted file mode 100644 index 155343600d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestsize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml deleted file mode 100644 index d3aafb93c3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: responsesize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml deleted file mode 100644 index 33e8f468b9..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytereceived - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml deleted file mode 100644 index 39df34138c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytesent - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml deleted file mode 100644 index f2b80ce1d8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsclosed - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml deleted file mode 100644 index 68dbbf0c9c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsopened - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 16f89c981d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 6ba4b19caa..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount.metric - - requestduration.metric - - requestsize.metric - - responsesize.metric - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index 74466f18be..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent.metric - - tcpbytereceived.metric - match: context.protocol == "tcp" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 4414aa902c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index 5d119b596e..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml deleted file mode 100644 index 2d272125d1..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - accesslog.logentry - match: context.protocol == "http" || context.protocol == "grpc" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml deleted file mode 100644 index 339c38a2bd..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdiotcp - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - tcpaccesslog.logentry - match: context.protocol == "tcp" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 7e713777c2..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes - match: context.protocol == "tcp" diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 4bc62dd7f8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index 97db246c89..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml deleted file mode 100644 index a1c5f6ab12..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-egressgateway - istio: egressgateway - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 9a384b903b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 579d4ec2e0..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 73bd8933ad..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ac4f6464a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index ee5c3a1dee..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - release: istio diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index cb57ab8639..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index b31002df62..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - list - - delete diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 14745dd1b5..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index 31cd021e86..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,85 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml deleted file mode 100644 index f38f3710ac..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index ce57730853..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index 4c406989f2..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fbf58bcdd1..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index 06d72de038..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml deleted file mode 100644 index a00bd03674..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-viewer -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - servicecontrolreports - - servicecontrols - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - get - - list - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml deleted file mode 100644 index de91e8f85c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 4e42dfb6a6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index 28ac035ab6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index fcc37b18d8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "2" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-cleanup-secrets-istio-system -subjects: -- kind: ServiceAccount - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 291dd013b8..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-egressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 9c2ca1a82c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 473c34c42b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-grafana-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index c4b2804104..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-ingressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml deleted file mode 100644 index d1db23758b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: istio-kiali-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kiali -subjects: -- kind: ServiceAccount - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 8c801ce56f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index b7cccaacb3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - chart: istio-1.1.0 - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index fc78ced111..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index fc5d7a83d6..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index 455f52e864..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 57718cea6d..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 725830af27..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index cc77485872..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,123 +0,0 @@ -apiVersion: v1 -data: - validatingwebhookconfiguration.yaml: |- - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - namespace: istio-system - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - failurePolicy: Fail -kind: ConfigMap -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml deleted file mode 100644 index c7b460e359..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml +++ /dev/null @@ -1,341 +0,0 @@ -apiVersion: v1 -data: - galley-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- - Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", - "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 0 }, "id": 46, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"galley\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Galley Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 5 }, "id": 40, "panels": [], "title": "Resource Usage", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": - 6 }, "id": 36, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "process_virtual_memory_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Virtual Memory", - "refId": "A" }, { "expr": "process_resident_memory_bytes{job=\"galley\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", "refId": - "B" }, { "expr": "go_memstats_heap_sys_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "heap sys", "refId": "C" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "heap alloc", "refId": - "D" }, { "expr": "go_memstats_alloc_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F" }, { "expr": "go_memstats_heap_inuse_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": - "G" }, { "expr": "go_memstats_stack_inuse_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "H" }, { "expr": - "sum(container_memory_usage_bytes{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Total (kis)", "refId": - "E" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 6, "y": 6 }, "id": 38, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"}[1m]))", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": - "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}[1m])) by (container_name)", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B" - }, { "expr": "irate(process_cpu_seconds_total{job=\"galley\"}[1m])", "format": - "time_series", "intervalFactor": 2, "legendFormat": "galley (self-reported)", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 12, "y": 6 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"galley\"}", "format": "time_series", "intervalFactor": - 2, "legendFormat": "Open FDs (galley)", "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }} ", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeRegions": [], "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 6 }, "id": - 44, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "goroutines_total", - "refId": "A" }, { "expr": "galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "clients_total", "refId": "B" }, { "expr": - "go_goroutines{job=\"galley\"}/galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "avg_goroutines_per_client", "refId": "C" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 14 }, "id": 10, "panels": [], "title": "Runtime", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 15 }, "id": - 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(galley_runtime_strategy_on_change_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Strategy - Change Events", "refId": "A" }, { "expr": "sum(rate(galley_runtime_processor_events_processed_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Processed - Events", "refId": "B" }, { "expr": "sum(rate(galley_runtime_processor_snapshots_published_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Snapshot - Published", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Event Rates", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": "Events/min", "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": "", "logBase": 1, "max": null, "min": null, - "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 15 }, "id": 4, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(galley_runtime_strategy_timer_max_time_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Max Time - Reached", "refId": "A" }, { "expr": "sum(rate(galley_runtime_strategy_timer_quiesce_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Quiesce - Reached", "refId": "B" }, { "expr": "sum(rate(galley_runtime_strategy_timer_resets_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Timer Resets", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Timer Rates", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 15 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 3, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.50, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P50", "refId": - "A" }, { "expr": "histogram_quantile(0.90, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P90", "refId": - "B" }, { "expr": "histogram_quantile(0.95, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P95", "refId": - "C" }, { "expr": "histogram_quantile(0.99, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P99", "refId": - "D" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Events Per Snapshot", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by (typeURL) (galley_runtime_state_type_instances_total)", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ typeURL }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "State Type - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Count", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 27 }, "id": 34, "panels": [], "title": "Validation", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": - 28 }, "id": 28, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "galley_validation_cert_key_updates{job=\"galley\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Key Updates", "refId": - "A" }, { "expr": "galley_validation_cert_key_update_errors{job=\"galley\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Key Update Errors: {{ error - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], - "timeShift": null, "title": "Validation Webhook Certificate", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 28 }, "id": 30, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_passed{job=\"galley\"}) by (group, - version, resource)", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Passed: {{ group }}/{{ version }}/{{resource}}", "refId": "A" }, { "expr": "sum(galley_validation_failed{job=\"galley\"}) - by (group, version, resource, reason)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Failed: {{ group }}/{{ version }}/{{resource}} ({{ reason}})", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Resource Validation", "tooltip": { "shared": true, "sort": 0, - "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": - "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } - ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": - false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": - 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": 28 }, "id": 32, "legend": { "avg": - false, "current": false, "max": false, "min": false, "show": true, "total": false, - "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_http_error{job=\"galley\"}) by (status)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ status }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Validation HTTP Errors", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 34 }, "id": 12, "panels": [], "title": - "Kubernetes Source", "type": "row" }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 0, "y": 35 }, "id": 14, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_event_success_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Success", "refId": "A" }, { "expr": "rate(galley_source_kube_event_error_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Source Event Rate", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 35 }, "id": 16, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_dynamic_converter_success_total[1m]) * 60", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{apiVersion=\"{{apiVersion}}\",group=\"{{group}}\",kind=\"{{kind}}\"}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Successes", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Conversions/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": - 35 }, "id": 24, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(galley_source_kube_dynamic_converter_failure_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Failures", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Failures/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "collapsed": false, "gridPos": { "h": 1, "w": 24, "x": 0, "y": 41 - }, "id": 18, "panels": [], "title": "Mesh Configuration Protocol", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 42 }, "id": - 20, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(galley_mcp_source_clients_total)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Clients", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Connected Clients", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 42 }, "id": 22, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by(collection)(irate(galley_mcp_source_request_acks_total[1m]) * 60)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Request - ACKs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": "ACKs/min", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 42 }, "id": 26, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_mcp_source_request_nacks_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Request NACKs", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "NACKs/min", "logBase": 1, "max": null, "min": null, - "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, - "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } - } ], "refresh": "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": - { "list": [] }, "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Galley Dashboard", "uid": "TSEY6jLmk", "version": 1 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-galley-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml deleted file mode 100644 index 8be80d7176..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: v1 -data: - istio-mesh-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "singlestat", "name": - "Singlestat", "version": "5.0.0" }, { "type": "panel", "id": "table", "name": - "Table", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "content": - "
\n
\n Istio\n
\n
\n Istio - is an open platform - that provides a uniform way to connect,\n manage, and \n secure microservices.\n
\n Need help? Join the - Istio community.\n
\n
", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "50px", "id": 13, "links": - [], "mode": "html", "style": { "font-size": "18pt" }, "title": "", "transparent": - true, "type": "text" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": - false, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "datasource": "Prometheus", "format": "ops", "gauge": { "maxValue": - 100, "minValue": 0, "show": false, "thresholdLabels": false, "thresholdMarkers": - true }, "gridPos": { "h": 3, "w": 6, "x": 0, "y": 3 }, "id": 20, "interval": null, - "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", "value": - 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": - "connected", "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": - "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": - "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, - "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": "", "targets": - [ { "expr": "round(sum(irate(istio_requests_total{reporter=\"destination\"}[1m])), - 0.001)", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": "", "title": - "Global Request Volume", "transparent": false, "type": "singlestat", "valueFontSize": - "80%", "valueMaps": [ { "op": "=", "text": "N/A", "value": "null" } ], "valueName": - "avg" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": false, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "datasource": "Prometheus", "format": "percentunit", "gauge": { - "maxValue": 100, "minValue": 80, "show": false, "thresholdLabels": false, "thresholdMarkers": - false }, "gridPos": { "h": 3, "w": 6, "x": 6, "y": 3 }, "id": 21, "interval": - null, "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", - "value": 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, - "nullPointMode": "connected", "nullText": null, "postfix": "", "postfixFontSize": - "50%", "prefix": "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", - "text": "N/A", "to": "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, - 0.18)", "full": true, "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": - "", "targets": [ { "expr": "sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) / sum(rate(istio_requests_total{reporter=\"destination\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": - "95, 99, 99.5", "title": "Global Success Rate (non-5xx responses)", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 12, "y": 3 }, "id": 22, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"4.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "4xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 18, "y": 3 }, "id": 23, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"5.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "5xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "columns": [], "datasource": - "Prometheus", "fontSize": "100%", "gridPos": { "h": 21, "w": 24, "x": 0, "y": - 6 }, "hideTimeOverride": false, "id": 73, "links": [], "pageSize": null, "repeat": - null, "repeatDirection": "v", "scroll": true, "showHeader": true, "sort": { "col": - 4, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": false, "linkTargetBlank": - false, "linkTooltip": "Workload dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_2&var-workload=$__cell_", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": - "Time", "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Requests", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [], "type": "number", "unit": "ops" }, - { "alias": "P50 Latency", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "Value #B", "thresholds": [], "type": "number", - "unit": "s" }, { "alias": "P90 Latency", "colorMode": null, "colors": [ "rgba(245, - 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #D", "thresholds": [], - "type": "number", "unit": "s" }, { "alias": "P99 Latency", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value - #E", "thresholds": [], "type": "number", "unit": "s" }, { "alias": "Success Rate", - "colorMode": "cell", "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, - 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #F", "thresholds": [ ".95", " 1.00" ], "type": "number", - "unit": "percentunit" }, { "alias": "Workload", "colorMode": null, "colors": [ - "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": - "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-workload=$__cell_2&var-namespace=$__cell_3", - "pattern": "destination_workload_var", "thresholds": [], "type": "number", "unit": - "short" }, { "alias": "Service", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": "$__cell dashboard", - "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", "pattern": - "destination_service", "thresholds": [], "type": "string", "unit": "short" }, - { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, - 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", - "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": [], - "type": "hidden", "unit": "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_requests_total{reporter=\"destination\", - response_code=\"200\"}[1m])) by (destination_workload, destination_workload_namespace, - destination_service), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "intervalFactor": 1, "legendFormat": "{{ destination_workload}}.{{ destination_workload_namespace - }}", "refId": "A" }, { "expr": "label_join(histogram_quantile(0.50, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload}}.{{ destination_workload_namespace }}", "refId": "B" - }, { "expr": "label_join(histogram_quantile(0.90, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "D" - }, { "expr": "label_join(histogram_quantile(0.99, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "E" - }, { "expr": "label_join((sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) by (destination_workload, destination_workload_namespace) - / sum(rate(istio_requests_total{reporter=\"destination\"}[1m])) by (destination_workload, - destination_workload_namespace)), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "interval": "", "intervalFactor": 1, "legendFormat": "{{ destination_workload - }}.{{ destination_workload_namespace }}", "refId": "F" } ], "timeFrom": null, - "title": "HTTP/GRPC Workloads", "transform": "table", "transparent": false, "type": - "table" }, { "columns": [], "datasource": "Prometheus", "fontSize": "100%", "gridPos": - { "h": 18, "w": 24, "x": 0, "y": 27 }, "hideTimeOverride": false, "id": 109, "links": - [], "pageSize": null, "repeatDirection": "v", "scroll": true, "showHeader": true, - "sort": { "col": 2, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": - false, "linkTargetBlank": false, "linkTooltip": "$__cell dashboard", "linkUrl": - "/dashboard/db/istio-tcp-workload-dashboard?var-namespace=$__cell_2&&var-workload=$__cell", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Bytes Sent", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [ "" ], "type": "number", "unit": "Bps" - }, { "alias": "Bytes Received", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #C", "thresholds": [], - "type": "number", "unit": "Bps" }, { "alias": "", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Time", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Workload", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_3&var-workload=$__cell_2", - "pattern": "destination_workload_var", "thresholds": [], "type": "string", "unit": - "short" }, { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Service", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", - "pattern": "destination_service", "thresholds": [], "type": "number", "unit": - "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_tcp_received_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "C" }, { "expr": "label_join(sum(rate(istio_tcp_sent_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "A" } ], "timeFrom": null, "title": "TCP - Workloads", "transform": "table", "transparent": false, "type": "table" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 24, "x": 0, "y": 45 }, "id": 111, "legend": - { "alignAsTable": false, "avg": false, "current": false, "max": false, "min": - false, "rightSide": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(istio_build) by (component, tag)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ component }}: {{ tag }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Istio Components by Version", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "transparent": - false, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Mesh - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml deleted file mode 100644 index 0d56502d7a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml +++ /dev/null @@ -1,150 +0,0 @@ -apiVersion: v1 -data: - istio-performance-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 12, "x": 0, "y": 0 }, "id": 2, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m])) - / (round(sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m])), 0.001)/1000)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "istio-ingressgateway", "refId": "B" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", - "refId": "C" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU / 1k rps", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 12, "y": 0 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-ingressgateway", - "refId": "B" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", "refId": - "C" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 0, "y": 9 }, "id": 4, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "(sum(container_memory_usage_bytes{pod_name=~\"istio-telemetry-.*\"}) / (sum(irate(istio_requests_total[1m])) - / 1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry - / 1k rps", "refId": "A" }, { "expr": "sum(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\"}) - / count(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\",container_name!=\"POD\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-ingressgateway", - "refId": "C" }, { "expr": "sum(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"}) - / count(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-proxy", - "refId": "B" }, { "expr": "(sum(container_memory_usage_bytes{pod_name=~\"istio-policy-.*\"}) - / (sum(irate(istio_requests_total[1m])) / 1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy - / 1k rps", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "decbytes", "label": - null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 9, "w": 12, "x": 12, "y": 9 }, "id": 5, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-telemetry\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-telemetry\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m]))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "istio-ingressgateway", "refId": "C" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_response_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m])) + sum(irate(istio_request_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_request_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m]))", "format": "time_series", "intervalFactor": 1, - "legendFormat": "istio-proxy", "refId": "D" }, { "expr": "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-policy\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-policy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "E" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Bytes transferred / sec", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 24, "x": 0, "y": 18 }, "id": 8, "legend": { "alignAsTable": false, "avg": - false, "current": false, "max": false, "min": false, "rightSide": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build) by (component, - tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ component - }}: {{ tag }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Istio Components by Version", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "transparent": false, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "The charts on this dashboard are intended to show Istio - main components cost in terms resources utilization under steady load.\n\n- **vCPU/1k - rps:** shows vCPU utilization by the main Istio components normalized by 1000 - requests/second. When idle or low traffic, this chart will be blank. The curve - for istio-proxy refers to the services sidecars only. \n- **vCPU:** vCPU utilization - by Istio components, not normalized.\n- **Memory:** memory footprint for the components. - Telemetry and policy are normalized by 1k rps, and no data is shown when there - is no traffic. For ingress and istio-proxy, the data is per instance. \n- **Bytes - transferred/ sec:** shows the number of bytes flowing through each Istio component.", - "gridPos": { "h": 4, "w": 24, "x": 0, "y": 18 }, "id": 11, "links": [], "mode": - "markdown", "title": "Istio Performance Dashboard Readme", "type": "text" } ], - "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": [] }, - "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Performance Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml deleted file mode 100644 index d39f3a822a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml +++ /dev/null @@ -1,795 +0,0 @@ -apiVersion: v1 -data: - istio-service-dashboard.json: "{ \"annotations\": { \"list\": [ { \"builtIn\": 1, - \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": true, \"iconColor\": - \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", \"type\": \"dashboard\" - } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": 0, \"iteration\": - 1536442501501, \"links\": [], \"panels\": [ { \"content\": \"
\\nSERVICE: $service\\n
\", \"gridPos\": { \"h\": - 3, \"w\": 24, \"x\": 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", - \"title\": \"\", \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": - null, \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"rgba(245, - 54, 54, 0.9)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": - \"Prometheus\", \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Client Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 3 }, \"id\": 14, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Client Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Client Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 3 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m]))\", \"format\": \"time_series\", \"hide\": - false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" } ], \"thresholds\": - \"\", \"title\": \"TCP Received Bytes\", \"transparent\": false, \"type\": \"singlestat\", - \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", - \"value\": \"null\" } ], \"valueName\": \"avg\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 7 }, \"id\": 97, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Server Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 7 }, \"id\": 98, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Server Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 7 }, \"id\": 99, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Server Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 7 }, \"id\": 100, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m])) \", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Sent Bytes\", \"transparent\": false, - \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": - \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" }, { - \"content\": \"
\\nCLIENT - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"source\\\",source_workload=~\\\"$srcwl\\\",source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"source\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace }} : - {{ response_code }}\", \"refId\": \"A\", \"step\": 2 } ], \"thresholds\": [], - \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Requests by Source - And Response Code\", \"tooltip\": { \"shared\": false, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": - [ { \"format\": \"ops\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"description\": \"\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 20 }, \"id\": - 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, \"rightSide\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 20 }, \"id\": - 68, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": - 80, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, - \"alignLevel\": null } }, { \"content\": \"
\\nSERVICE - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 32 }, \"id\": 69, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 35 }, \"id\": 90, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"destination\\\",destination_workload=~\\\"$dstwl\\\",destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace, response_code), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"destination\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[5m])) by (destination_workload, - destination_workload_namespace, response_code), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }}\", \"refId\": \"A\", - \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Incoming Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null - } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 12, \"y\": 35 }, \"id\": 91, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", - \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], - \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming - Success Rate (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 41 }, \"id\": 94, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 95, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 96, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 92, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace}} (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace}}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Bytes Received from - Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": - true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, - \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, \"alignLevel\": - null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 12, \"x\": 12, \"y\": 47 }, \"id\": 93, \"legend\": { \"avg\": false, \"current\": - false, \"max\": false, \"min\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } } ], \"refresh\": \"10s\", \"schemaVersion\": - 16, \"style\": \"dark\", \"tags\": [], \"templating\": { \"list\": [ { \"allValue\": - null, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": false, \"label\": - \"Service\", \"multi\": false, \"name\": \"service\", \"options\": [], \"query\": - \"label_values(destination_service)\", \"refresh\": 1, \"regex\": \"\", \"sort\": - 0, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", - \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": \"All\", - \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": - true, \"label\": \"Client Workload Namespace\", \"multi\": true, \"name\": \"srcns\", - \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (source_workload_namespace) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\"}) by (source_workload_namespace))\", \"refresh\": - 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": { \"text\": \"All\", \"value\": \"$__all\" - }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": - \"Client Workload\", \"multi\": true, \"name\": \"srcwl\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", source_workload_namespace=~\\\"$srcns\\\"}) - by (source_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload Namespace\", \"multi\": true, - \"name\": \"dstns\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (destination_workload_namespace) or - sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\"}) - by (destination_workload_namespace))\", \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", - \"sort\": 2, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload\", \"multi\": true, \"name\": - \"dstwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Service Dashboard\", \"uid\": \"LJ_uJAvmk\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-service-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml deleted file mode 100644 index a3022b2cab..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml +++ /dev/null @@ -1,744 +0,0 @@ -apiVersion: v1 -data: - istio-workload-dashboard.json: "{ \"__inputs\": [ { \"name\": \"DS_PROMETHEUS\", - \"label\": \"Prometheus\", \"description\": \"\", \"type\": \"datasource\", \"pluginId\": - \"prometheus\", \"pluginName\": \"Prometheus\" } ], \"__requires\": [ { \"type\": - \"grafana\", \"id\": \"grafana\", \"name\": \"Grafana\", \"version\": \"5.0.4\" - }, { \"type\": \"panel\", \"id\": \"graph\", \"name\": \"Graph\", \"version\": - \"5.0.0\" }, { \"type\": \"datasource\", \"id\": \"prometheus\", \"name\": \"Prometheus\", - \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"singlestat\", \"name\": - \"Singlestat\", \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"text\", - \"name\": \"Text\", \"version\": \"5.0.0\" } ], \"annotations\": { \"list\": [ - { \"builtIn\": 1, \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": - true, \"iconColor\": \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", - \"type\": \"dashboard\" } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": - 0, \"id\": null, \"iteration\": 1531345461465, \"links\": [], \"panels\": [ { - \"content\": \"
\\nWORKLOAD: - $workload.$namespace\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": - 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", \"title\": \"\", - \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 8, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Incoming Request Volume\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"current\" }, { \"cacheTimeout\": null, \"colorBackground\": false, - \"colorValue\": false, \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(245, 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", - \"decimals\": null, \"format\": \"percentunit\", \"gauge\": { \"maxValue\": 100, - \"minValue\": 80, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": - false }, \"gridPos\": { \"h\": 4, \"w\": 8, \"x\": 8, \"y\": 3 }, \"id\": 14, - \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": - \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 - } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": null, - \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Incoming Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 8, - \"x\": 16, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"interval\": \"\", \"intervalFactor\": 1, \"legendFormat\": - \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P90\", - \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P99\", - \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Request Duration\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"cacheTimeout\": null, - \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"#299c46\", - \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": - \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": - false, \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": - 0, \"y\": 7 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": - 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": - \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": - \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", - \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": \"null\", - \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": \"rgba(31, - 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", \"show\": - true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\"}[1m])) - + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\"}[1m]))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Server Traffic\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": - \"Prometheus\", \"format\": \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": 12, \"y\": 7 }, \"id\": 85, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\"}[1m])) + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\"}[1m]))\", - \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"\", \"refId\": \"A\" } ], \"thresholds\": \"\", \"title\": \"TCP Client Traffic\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"avg\" }, { \"content\": \"
\\nINBOUND - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - source_workload }}.{{ source_workload_namespace }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Requests by Source And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 20 }, \"id\": 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 8, \"x\": 16, \"y\": 20 }, \"id\": 68, \"legend\": { \"alignAsTable\": false, - \"avg\": false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": - false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": false - }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Response Size By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"decbytes\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", - \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, - \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": - 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": 80, \"legend\": - { \"avg\": false, \"current\": false, \"max\": false, \"min\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}} - (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"content\": - \"
\\nOUTBOUND SERVICES\\n
\", - \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": 32 }, \"id\": 69, \"links\": - [], \"mode\": \"html\", \"title\": \"\", \"transparent\": true, \"type\": \"text\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 0, \"y\": 35 }, \"id\": 70, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"max\": false, \"min\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null as zero\", \"percentage\": false, \"pointradius\": 5, - \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, - \"legendFormat\": \"{{ destination_service }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 35 }, \"id\": 71, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Outgoing Success Rate (non-5xx responses) By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"description\": \"\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 41 }, \"id\": 72, \"legend\": { \"alignAsTable\": - false, \"avg\": false, \"current\": false, \"hideEmpty\": true, \"hideZero\": - false, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": - false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": - false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Duration by Destination\", \"tooltip\": { - \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 73, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 74, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 76, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent on Outgoing TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 47 }, \"id\": - 78, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Received from Outgoing TCP Connection\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] } ], \"refresh\": - \"10s\", \"schemaVersion\": 16, \"style\": \"dark\", \"tags\": [], \"templating\": - { \"list\": [ { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", - \"hide\": 0, \"includeAll\": false, \"label\": \"Namespace\", \"multi\": false, - \"name\": \"namespace\", \"options\": [], \"query\": \"query_result(sum(istio_requests_total) - by (destination_workload_namespace) or sum(istio_tcp_sent_bytes_total) by (destination_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*_namespace=\\\"([^\\\"]*).*/\", \"sort\": 0, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": false, \"label\": \"Workload\", \"multi\": false, \"name\": - \"workload\", \"options\": [], \"query\": \"query_result((sum(istio_requests_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_requests_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)) or (sum(istio_tcp_sent_bytes_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 1, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": {}, \"datasource\": - \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": \"Inbound Workload - Namespace\", \"multi\": true, \"name\": \"srcns\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace) - or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Inbound Workload\", \"multi\": true, \"name\": - \"srcwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload))\", \"refresh\": - 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", \"sort\": 3, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Destination Service\", \"multi\": true, - \"name\": \"dstsvc\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service) or sum(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service))\", \"refresh\": 1, \"regex\": \"/.*destination_service=\\\"([^\\\"]*).*/\", - \"sort\": 4, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Workload Dashboard\", \"uid\": \"UbsSZTDik\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml deleted file mode 100644 index 9a7f42a256..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml +++ /dev/null @@ -1,359 +0,0 @@ -apiVersion: v1 -data: - mixer-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "limit": - 100, "name": "Annotations & Alerts", "showIn": 0, "type": "dashboard" } ] }, "editable": - false, "gnetId": null, "graphTooltip": 1, "id": null, "iteration": 1543881232533, - "links": [], "panels": [ { "content": "

Deployed Versions

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "40", "id": 62, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 3 }, "id": 64, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"mixer\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Mixer Versions", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "

Resource Usage

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(process_virtual_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "instant": false, "intervalFactor": 2, "legendFormat": - "Virtual Memory ({{ job }})", "refId": "I" }, { "expr": "sum(process_resident_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident - Memory ({{ job }})", "refId": "H" }, { "expr": "sum(go_memstats_heap_sys_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap sys ({{ job }})", "refId": "A" }, { "expr": "sum(go_memstats_heap_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap alloc ({{ job }})", "refId": "D" }, { "expr": "sum(go_memstats_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Alloc - ({{ job }})", "refId": "F" }, { "expr": "sum(go_memstats_heap_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "Heap in-use ({{ job }})", "refId": "E" }, { "expr": "sum(go_memstats_stack_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Stack - in-use ({{ job }})", "refId": "G" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (service)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "C" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Memory", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "bytes", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": 11 }, "id": 6, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (pod_name), \"service\", - \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "A" }, { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (container_name, pod_name), - \"service\", \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" }, { "expr": "sum(irate(process_cpu_seconds_total{job=~\"istio-telemetry|istio-policy\"}[1m])) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "{{ job }} (self-reported)", "refId": "C" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(process_open_fds{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "hide": true, "instant": false, "interval": "", "intervalFactor": - 2, "legendFormat": "Open FDs ({{ job }})", "refId": "A" }, { "expr": "sum(label_replace(container_fs_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "{{ service }} - {{ container_name - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Disk", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "decimals": null, "format": "none", - "label": "", "logBase": 1024, "max": null, "min": null, "show": false } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 7, "w": 6, "x": 18, "y": 11 }, "id": 4, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": false, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(go_goroutines{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines ({{ - job }})", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Mixer Overview

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 18 }, "height": "40px", "id": 30, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 0, "y": 21 }, "id": 9, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "mixer (Total)", - "refId": "B" }, { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m])) by (grpc_server_method)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "mixer ({{ grpc_server_method - }})", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Incoming Requests", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 6, "x": 6, "y": 21 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [ { - "alias": "{}", "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": - false, "targets": [ { "expr": "histogram_quantile(0.5, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.5", "refId": "B" }, { "expr": "histogram_quantile(0.9, - sum(rate(grpc_io_server_server_latency_bucket{}[1m])) by (grpc_server_method, - le))", "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ grpc_server_method - }} 0.9", "refId": "C" }, { "expr": "histogram_quantile(0.99, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.99", "refId": "D" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Response Durations", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "ms", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 12, "y": 21 }, "id": - 11, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(grpc_server_handled_total{grpc_code=~\"Unknown|Unimplemented|Internal|DataLoss\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Server Error Rate (5xx responses)", "tooltip": { - "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 18, "y": - 21 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(irate(grpc_server_handled_total{grpc_code!=\"OK\",grpc_service=~\".*Mixer\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Non-successes (4xxs)", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "content": - "

Adapters and Config

", "gridPos": { "h": 3, "w": 24, - "x": 0, "y": 27 }, "id": 28, "links": [], "mode": "html", "title": "", "transparent": - true, "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, - "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": - 12, "x": 0, "y": 30 }, "id": 13, "legend": { "avg": false, "current": false, "max": - false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(mixer_runtime_dispatches_total{adapter=~\"$adapter\"}[1m])) by (adapter)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ adapter }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Adapter Dispatch Count", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 30 }, "id": 14, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.5, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p50", "refId": "A" }, { "expr": "histogram_quantile(0.9, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p90 ", "refId": "B" }, { "expr": "histogram_quantile(0.99, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p99", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Adapter Dispatch Duration", "tooltip": { "shared": true, "sort": - 1, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "s", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 37 }, "id": 60, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "scalar(topk(1, max(mixer_config_rule_config_count) by - (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": "Rules", - "refId": "A" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Config Errors", "refId": "B" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_match_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Match Errors", "refId": "C" }, { "expr": "scalar(topk(1, max(mixer_config_unsatisfied_action_handler_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Unsatisfied Actions", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Rules", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 6, "y": 37 }, "id": 56, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_instance_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Instances", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Instances - in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 37 }, "id": 54, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_handler_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Handlers", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Handlers in - Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 18, "y": 37 }, "id": 58, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_attribute_count) by (configID)))", "format": - "time_series", "instant": false, "intervalFactor": 1, "legendFormat": "Attributes", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Attributes in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Individual Adapters

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 44 }, "id": 23, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 47 }, "id": 46, "panels": [], "repeat": - "adapter", "title": "$adapter Adapter", "type": "row" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 12, "x": 0, "y": 48 }, "id": 17, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(irate(mixer_runtime_dispatches_total{adapter=\"$adapter\"}[1m]),\"handler\", - \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ handler }} (error: {{ error }})", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Dispatch - Count By Handler", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 48 }, "id": 18, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(histogram_quantile(0.5, sum(rate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p50 - {{ handler_short - }} (error: {{ error }})", "refId": "A" }, { "expr": "label_replace(histogram_quantile(0.9, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p90 - {{ handler_short - }} (error: {{ error }})", "refId": "D" }, { "expr": "label_replace(histogram_quantile(0.99, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p99 - {{ handler_short - }} (error: {{ error }})", "refId": "E" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Dispatch Duration By Handler", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "s", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": - "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": - [ { "allValue": null, "current": {}, "datasource": "Prometheus", "hide": 0, "includeAll": - true, "label": "Adapter", "multi": true, "name": "adapter", "options": [], "query": - "label_values(adapter)", "refresh": 2, "regex": "", "sort": 1, "tagValuesQuery": - "", "tags": [], "tagsQuery": "", "type": "query", "useTags": false } ] }, "time": - { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", - "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ - "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Mixer Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-mixer-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml deleted file mode 100644 index 32987ba7de..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml +++ /dev/null @@ -1,307 +0,0 @@ -apiVersion: v1 -data: - pilot-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": - "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, "gnetId": - null, "graphTooltip": 1, "id": null, "links": [], "panels": [ { "content": "

Deployed - Versions

", "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": - "40", "id": 58, "links": [], "mode": "html", "title": "", "transparent": true, - "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": - false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": - 0, "y": 3 }, "id": 56, "legend": { "avg": false, "current": false, "max": false, - "min": false, "show": true, "total": false, "values": false }, "lines": true, - "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": - 5, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": - 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build{component=\"pilot\"}) - by (tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ tag - }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Pilot Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Resource Usage

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "process_virtual_memory_bytes{job=\"pilot\"}", "format": - "time_series", "instant": false, "intervalFactor": 2, "legendFormat": "Virtual - Memory", "refId": "I", "step": 2 }, { "expr": "process_resident_memory_bytes{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", - "refId": "H", "step": 2 }, { "expr": "go_memstats_heap_sys_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - sys", "refId": "A" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - alloc", "refId": "D" }, { "expr": "go_memstats_alloc_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F", "step": - 2 }, { "expr": "go_memstats_heap_inuse_bytes{job=\"pilot\"}", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": "E", - "step": 2 }, { "expr": "go_memstats_stack_inuse_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "G", - "step": 2 }, { "expr": "sum(container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"})", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "Total (k8s)", "refId": "C", "step": 2 }, { "expr": "container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B", "step": 2 } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Memory", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "bytes", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": - 11 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m]))", "format": "time_series", "hide": false, - "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": "A", "step": 2 }, - { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m])) by (container_name)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", - "refId": "B", "step": 2 }, { "expr": "irate(process_cpu_seconds_total{job=\"pilot\"}[1m])", - "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "pilot - (self-reported)", "refId": "C", "step": 2 } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"pilot\"}", "format": "time_series", "hide": true, "instant": - false, "interval": "", "intervalFactor": 2, "legendFormat": "Open FDs (pilot)", - "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }}", "refId": "B", "step": 2 } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "bytes", "label": "", "logBase": 1, "max": null, "min": null, "show": - true }, { "decimals": null, "format": "none", "label": "", "logBase": 1024, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 18, "y": - 11 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": false, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines", - "refId": "A", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

xDS

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 18 }, "id": 28, "links": [], "mode": "html", "title": - "", "transparent": true, "type": "text" }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 6, "w": 8, "x": 0, "y": 21 }, "id": 40, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 1, "legendFormat": "XDS GRPC Successes", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Updates", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "round(sum(rate(envoy_cluster_update_attempt{cluster_name=\"xds-grpc\"}[1m])) - - sum(rate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m])))", "format": - "time_series", "intervalFactor": 2, "legendFormat": "XDS GRPC ", "refId": "A", - "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Failures", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 21 }, "id": 41, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(envoy_cluster_upstream_cx_active{cluster_name=\"xds-grpc\"})", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Pilot (XDS GRPC)", "refId": - "C", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Active Connections", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 8, "x": 0, "y": 27 }, "id": 45, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "pilot_conflict_inbound_listener{job=\"pilot\"}", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Inbound Listeners", "refId": "B" }, { "expr": "pilot_conflict_outbound_listener_http_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (http over current tcp)", "refId": "A" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current tcp)", "refId": "C" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_http{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current http)", "refId": "D" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Conflicts", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 8, "y": 27 }, "id": 47, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "pilot_virt_services{job=\"pilot\"}", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Virtual Services", "refId": "A" }, { "expr": - "pilot_services{job=\"pilot\"}", "format": "time_series", "intervalFactor": 1, - "legendFormat": "Services", "refId": "B" }, { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "hide": true, "intervalFactor": 1, "legendFormat": "Rejected CDS Configs - {{ - node }}: {{ err }}", "refId": "C" }, { "expr": "pilot_xds_eds_reject{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 1, "legendFormat": "Rejected - EDS Configs", "refId": "D" }, { "expr": "pilot_xds{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Connected Endpoints", "refId": - "E" }, { "expr": "rate(pilot_xds_write_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Write Timeouts", "refId": - "F" }, { "expr": "rate(pilot_xds_push_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Push Timeouts", "refId": - "G" }, { "expr": "rate(pilot_xds_pushes{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Pushes ({{ type }})", "refId": "H" }, { - "expr": "rate(pilot_xds_push_errors{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Push Errors ({{ type }})", "refId": "I" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "ADS Monitoring", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 16, "y": - 27 }, "id": 49, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{ err }})", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected CDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 0, "y": 35 }, "id": 52, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_eds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected EDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 8, "y": - 35 }, "id": 54, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_lds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected LDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 16, "y": 35 }, "id": 53, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_rds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected RDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": { "outbound|80||default-http-backend.kube-system.svc.cluster.local": - "rgba(255, 255, 255, 0.97)" }, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 0, "y": - 42 }, "id": 51, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [ { "alias": "outbound|80||default-http-backend.kube-system.svc.cluster.local", - "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": - [ { "expr": "sum(pilot_xds_eds_instances{job=\"pilot\"}) by (cluster)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ cluster }}", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "EDS - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Pilot - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-pilot-dashboard - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml deleted file mode 100644 index 6329dad866..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - apiVersion: authentication.istio.io/v1alpha1 - kind: Policy - metadata: - name: grafana-ports-mtls-disabled - namespace: istio-system - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - targets: - - name: grafana - ports: - - number: 3000 - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-custom-resources - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml deleted file mode 100644 index 251c4e2669..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -data: - dashboardproviders.yaml: | - apiVersion: 1 - providers: - - disableDeletion: false - folder: istio - name: istio - options: - path: /var/lib/grafana/dashboards/istio - orgId: 1 - type: file - datasources.yaml: | - apiVersion: 1 - datasources: - - access: proxy - editable: true - isDefault: true - jsonData: - timeInterval: 5s - name: Prometheus - orgId: 1 - type: prometheus - url: http://prometheus:9090 -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 337758a25f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - chart: security - heritage: Tiller - release: istio - spec: - peers: - - mtls: - mode: PERMISSIVE - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index 03832c4720..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: v1 -data: - config: "policy: enabled\ntemplate: |-\n rewriteAppHTTPProbe: false\n initContainers:\n - \ [[ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"NONE\" ]]\n - name: istio-init\n image: \"docker.io/istio/proxy_init:1.1.6\"\n - \ args:\n - \"-p\"\n - [[ .MeshConfig.ProxyListenPort ]]\n - \"-u\"\n - \ - 1337\n - \"-m\"\n - [[ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` - .ProxyConfig.InterceptionMode ]]\n - \"-i\"\n - \"[[ annotation .ObjectMeta - `traffic.sidecar.istio.io/includeOutboundIPRanges` \"*\" ]]\"\n - \"-x\"\n - \ - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` - \ \"\" ]]\"\n - \"-b\"\n - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` - (includeInboundPorts .Spec.Containers) ]]\"\n - \"-d\"\n - \"[[ excludeInboundPort - (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 ) (annotation .ObjectMeta - `traffic.sidecar.istio.io/excludeInboundPorts` \"\" ) ]]\"\n [[ if (isset - .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -]]\n - - \"-k\"\n - \"[[ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` - ]]\"\n [[ end -]]\n imagePullPolicy: IfNotPresent\n resources:\n requests:\n - \ cpu: 10m\n memory: 10Mi\n limits:\n cpu: 100m\n memory: - 50Mi\n securityContext:\n runAsUser: 0\n runAsNonRoot: false\n capabilities:\n - \ add:\n - NET_ADMIN\n restartPolicy: Always\n [[ end -]]\n containers:\n - \ - name: istio-proxy\n image: [[ annotation .ObjectMeta `sidecar.istio.io/proxyImage` - \ \"docker.io/istio/proxyv2:1.1.6\" ]]\n ports:\n - containerPort: 15090\n - \ protocol: TCP\n name: http-envoy-prom\n args:\n - proxy\n - - sidecar\n - --domain\n - $(POD_NAMESPACE).svc.cluster.local\n - --configPath\n - \ - [[ .ProxyConfig.ConfigPath ]]\n - --binaryPath\n - [[ .ProxyConfig.BinaryPath - ]]\n - --serviceCluster\n [[ if ne \"\" (index .ObjectMeta.Labels \"app\") - -]]\n - [[ index .ObjectMeta.Labels \"app\" ]].$(POD_NAMESPACE)\n [[ else - -]]\n - [[ valueOrDefault .DeploymentMeta.Name \"istio-proxy\" ]].[[ valueOrDefault - .DeploymentMeta.Namespace \"default\" ]]\n [[ end -]]\n - --drainDuration\n - \ - [[ formatDuration .ProxyConfig.DrainDuration ]]\n - --parentShutdownDuration\n - \ - [[ formatDuration .ProxyConfig.ParentShutdownDuration ]]\n - --discoveryAddress\n - \ - [[ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress - ]]\n - --zipkinAddress\n - [[ .ProxyConfig.GetTracing.GetZipkin.GetAddress - ]]\n - --connectTimeout\n - [[ formatDuration .ProxyConfig.ConnectTimeout - ]]\n - --proxyAdminPort\n - [[ .ProxyConfig.ProxyAdminPort ]]\n [[ if - gt .ProxyConfig.Concurrency 0 -]]\n - --concurrency\n - [[ .ProxyConfig.Concurrency - ]]\n [[ end -]]\n - --controlPlaneAuthPolicy\n - [[ annotation .ObjectMeta - `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy - ]]\n [[- if (ne (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 - ) \"0\") ]]\n - --statusPort\n - [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n - --applicationPorts\n - \"[[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` - (applicationPorts .Spec.Containers) ]]\"\n [[- end ]]\n env:\n - name: - POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - \ - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: - metadata.namespace\n - name: INSTANCE_IP\n valueFrom:\n fieldRef:\n - \ fieldPath: status.podIP\n \n - name: ISTIO_META_POD_NAME\n valueFrom:\n - \ fieldRef:\n fieldPath: metadata.name\n - name: ISTIO_META_CONFIG_NAMESPACE\n - \ valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - \ - name: ISTIO_META_INTERCEPTION_MODE\n value: [[ or (index .ObjectMeta.Annotations - \"sidecar.istio.io/interceptionMode\") .ProxyConfig.InterceptionMode.String ]]\n - \ [[ if .ObjectMeta.Annotations ]]\n - name: ISTIO_METAJSON_ANNOTATIONS\n - \ value: |\n [[ toJSON .ObjectMeta.Annotations ]]\n [[ end - ]]\n [[ if .ObjectMeta.Labels ]]\n - name: ISTIO_METAJSON_LABELS\n value: - |\n [[ toJSON .ObjectMeta.Labels ]]\n [[ end ]]\n [[- if (isset - .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) ]]\n - name: - ISTIO_BOOTSTRAP_OVERRIDE\n value: \"/etc/istio/custom-bootstrap/custom_bootstrap.json\"\n - \ [[- end ]]\n imagePullPolicy: IfNotPresent\n [[ if (ne (annotation .ObjectMeta - `status.sidecar.istio.io/port` 15020 ) \"0\") ]]\n readinessProbe:\n httpGet:\n - \ path: /healthz/ready\n port: [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n initialDelaySeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` - \ 1 ]]\n periodSeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` - \ 2 ]]\n failureThreshold: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` - \ 30 ]]\n [[ end -]]securityContext:\n readOnlyRootFilesystem: true\n - \ [[ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"TPROXY\" -]]\n capabilities:\n add:\n - NET_ADMIN\n runAsGroup: - 1337\n [[ else -]]\n \n runAsUser: 1337\n [[- end ]]\n resources:\n - \ [[ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset - .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -]]\n requests:\n - \ [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -]]\n - \ cpu: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` ]]\"\n - \ [[ end ]]\n [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) - -]]\n memory: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` - ]]\"\n [[ end ]]\n [[ else -]]\n limits:\n cpu: 2000m\n - \ memory: 128Mi\n requests:\n cpu: 10m\n memory: 40Mi\n - \ \n [[ end -]]\n volumeMounts:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - mountPath: /etc/istio/custom-bootstrap\n - \ name: custom-bootstrap-volume\n [[- end ]]\n - mountPath: /etc/istio/proxy\n - \ name: istio-envoy\n - mountPath: /etc/certs/\n name: istio-certs\n - \ readOnly: true\n [[- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` - ]]\n [[ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 4 ]]\n [[ - end ]]\n [[- end ]]\n volumes:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - name: custom-bootstrap-volume\n - \ configMap:\n name: [[ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` - `` ]]\n [[- end ]]\n - emptyDir:\n medium: Memory\n name: istio-envoy\n - \ - name: istio-certs\n secret:\n optional: true\n [[ if eq .Spec.ServiceAccountName - \"\" -]]\n secretName: istio.default\n [[ else -]]\n secretName: - [[ printf \"istio.%s\" .Spec.ServiceAccountName ]]\n [[ end -]]\n [[- - if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` ]]\n [[ range - $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 2 ]]\n [[ end - ]]\n [[ end ]]" -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index be0ffff1af..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - mesh: "# Set the following variable to true to disable policy checks by the Mixer.\n# - Note that metrics will still be reported to the Mixer.\ndisablePolicyChecks: false\n\n# - Set enableTracing to false to disable request tracing.\nenableTracing: true\n\n# - Set accessLogFile to empty string to disable access log.\naccessLogFile: \"/dev/stdout\"\n\n# - If accessLogEncoding is TEXT, value will be used directly as the log format\n# - example: \"[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\\n\"\n# - If AccessLogEncoding is JSON, value will be parsed as map[string]string\n# example: - '{\"start_time\": \"%START_TIME%\", \"req_method\": \"%REQ(:METHOD)%\"}'\n# Leave - empty to use default log format\naccessLogFormat: \"\"\n\n# Set accessLogEncoding - to JSON or TEXT to configure sidecar access log\naccessLogEncoding: 'TEXT'\nmixerCheckServer: - istio-policy.istio-system.svc.cluster.local:9091\nmixerReportServer: istio-telemetry.istio-system.svc.cluster.local:9091\n# - policyCheckFailOpen allows traffic in cases when the mixer policy service cannot - be reached.\n# Default is false which means the traffic is denied when the client - is unable to connect to Mixer.\npolicyCheckFailOpen: false\n# Let Pilot give ingresses - the public IP of the Istio ingressgateway\ningressService: istio-ingressgateway\n\n# - Default connect timeout for dynamic clusters generated by Pilot and returned via - XDS\nconnectTimeout: 10s\n\n# DNS refresh rate for Envoy clusters of type STRICT_DNS\ndnsRefreshRate: - 5s\n\n# Unix Domain Socket through which envoy communicates with NodeAgent SDS - to get\n# key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - \nsdsUdsPath: \n\n# This flag is used by secret discovery service(SDS). \n# If - set to true(prerequisite: https://kubernetes.io/docs/concepts/storage/volumes/#projected), - Istio will inject volumes mount \n# for k8s service account JWT, so that K8s API - server mounts k8s service account JWT to envoy container, which \n# will be used - to generate key/cert eventually. This isn't supported for non-k8s case.\nenableSdsTokenMount: - false\n\n# This flag is used by secret discovery service(SDS). \n# If set to true, - envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token' - \n# (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod) - \n# and pass to sds server, which will be used to request key/cert eventually. - \n# this flag is ignored if enableSdsTokenMount is set.\n# This isn't supported - for non-k8s case.\nsdsUseK8sSaJwt: false\n\n# The trust domain corresponds to - the trust root of a system.\n# Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain\ntrustDomain: - \n\n# Set the default behavior of the sidecar for handling outbound traffic from - the application:\n# ALLOW_ANY - outbound traffic to unknown destinations will - be allowed, in case there are no\n# services or ServiceEntries for the destination - port\n# REGISTRY_ONLY - restrict outbound traffic to services defined in the service - registry as well\n# as those defined through ServiceEntries \noutboundTrafficPolicy:\n - \ mode: ALLOW_ANY\n\nlocalityLbSetting:\n {}\n \n\n# The namespace to treat - as the administrative root namespace for istio\n# configuration. \nrootNamespace: - istio-system\nconfigSources:\n- address: istio-galley.istio-system.svc:9901\n\ndefaultConfig:\n - \ #\n # TCP connection timeout between Envoy & the application, and between Envoys. - \ Used for static clusters\n # defined in Envoy's configuration file\n connectTimeout: - 10s\n #\n ### ADVANCED SETTINGS #############\n # Where should envoy's configuration - be stored in the istio-proxy container\n configPath: \"/etc/istio/proxy\"\n binaryPath: - \"/usr/local/bin/envoy\"\n # The pseudo service name used for Envoy.\n serviceCluster: - istio-proxy\n # These settings that determine how long an old Envoy\n # process - should be kept alive after an occasional reload.\n drainDuration: 45s\n parentShutdownDuration: - 1m0s\n #\n # The mode used to redirect inbound connections to Envoy. This setting\n - \ # has no effect on outbound traffic: iptables REDIRECT is always used for\n - \ # outbound connections.\n # If \"REDIRECT\", use iptables REDIRECT to NAT and - redirect to Envoy.\n # The \"REDIRECT\" mode loses source addresses during redirection.\n - \ # If \"TPROXY\", use iptables TPROXY to redirect to Envoy.\n # The \"TPROXY\" - mode preserves both the source and destination IP\n # addresses and ports, so - that they can be used for advanced filtering\n # and manipulation.\n # The \"TPROXY\" - mode also configures the sidecar to run with the\n # CAP_NET_ADMIN capability, - which is required to use TPROXY.\n #interceptionMode: REDIRECT\n #\n # Port - where Envoy listens (on local host) for admin commands\n # You can exec into - the istio-proxy container in a pod and\n # curl the admin port (curl http://localhost:15000/) - to obtain\n # diagnostic information from Envoy. See\n # https://lyft.github.io/envoy/docs/operations/admin.html\n - \ # for more details\n proxyAdminPort: 15000\n #\n # Set concurrency to a specific - number to control the number of Proxy worker threads.\n # If set to 0 (default), - then start worker thread for each CPU thread/core.\n concurrency: 2\n #\n tracing:\n - \ zipkin:\n # Address of the Zipkin collector\n address: zipkin.istio-system:9411\n - \ #\n # Mutual TLS authentication between sidecars and istio control plane.\n - \ controlPlaneAuthPolicy: NONE\n #\n # Address where istio Pilot service is - running\n discoveryAddress: istio-pilot.istio-system:15010" - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - release: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml deleted file mode 100644 index ec52e4be53..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "istio_namespace: istio-system\nserver:\n port: 20001\nexternal_services:\n - \ istio:\n url_service_version: http://istio-pilot:8080/version\n jaeger:\n - \ url: \n grafana:\n url: \n" -kind: ConfigMap -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index 1a06e2ff6c..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,313 +0,0 @@ -apiVersion: v1 -data: - prometheus.yml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - metric_relabel_configs: - # Exclude some of the envoy metrics that have massive cardinality - # This list may need to be pruned further moving forward, as informed - # by performance and scalability testing. - - source_labels: [ cluster_name ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ tcp_prefix ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ listener_address ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_listener_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tls.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tcp_downstream.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_http_(stats|admin).*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_cluster_(lb|retry|bind|internal|max|original).*' - action: drop - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 072bd0fd7a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - istio-injection: disabled - name: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml deleted file mode 100644 index c96321c013..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - passphrase: YWRtaW4= - username: YWRtaW4= -kind: Secret -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -type: Opaque diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml deleted file mode 100644 index ddc7dbff72..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - ports: - - name: http - port: 3000 - protocol: TCP - targetPort: 3000 - selector: - app: grafana - type: ClusterIP diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 4215ecb031..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml deleted file mode 100644 index 4998a7f877..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - - name: https - port: 443 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-egressgateway - istio: egressgateway - release: istio - type: ClusterIP diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index e037f828d3..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index 5833ac81fa..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - release: istio - type: NodePort diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 20b0a6b506..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 31ff71c40b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 877561ec4a..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - port: 443 - selector: - istio: sidecar-injector diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index eebbbe6978..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml deleted file mode 100644 index 1dfd5cd653..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: agent-service - release: istio - name: jaeger-agent - namespace: istio-system -spec: - clusterIP: None - ports: - - name: agent-zipkin-thrift - port: 5775 - protocol: UDP - targetPort: 5775 - - name: agent-compact - port: 6831 - protocol: UDP - targetPort: 6831 - - name: agent-binary - port: 6832 - protocol: UDP - targetPort: 6832 - selector: - app: jaeger diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml deleted file mode 100644 index 5f4aeccfb5..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: collector-service - release: istio - name: jaeger-collector - namespace: istio-system -spec: - ports: - - name: jaeger-collector-tchannel - port: 14267 - protocol: TCP - targetPort: 14267 - - name: jaeger-collector-http - port: 14268 - protocol: TCP - targetPort: 14268 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml deleted file mode 100644 index 94a9e9d15b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: jaeger-service - release: istio - name: jaeger-query - namespace: istio-system -spec: - ports: - - name: query-http - port: 16686 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml deleted file mode 100644 index 049f4c74d7..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - ports: - - name: http-kiali - port: 20001 - protocol: TCP - selector: - app: kiali diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index f0ecb03d63..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml deleted file mode 100644 index 973e98032f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: null - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: tracing - namespace: istio-system -spec: - ports: - - name: http-query - port: 80 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml deleted file mode 100644 index 43acf02148..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: zipkin - namespace: istio-system -spec: - ports: - - name: http - port: 9411 - protocol: TCP - targetPort: 9411 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index 8cf250f0d0..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml deleted file mode 100644 index ab525f7ced..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml deleted file mode 100644 index 5581b918c1..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index adb8c1a617..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml deleted file mode 100644 index 94a0b1f0ac..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index ad9a81526f..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index c0c452e957..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index e6b9404cda..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index c844263f93..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index e40f71183b..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml deleted file mode 100644 index 6a40ec8143..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 2ad4d98808..0000000000 --- a/tests/stacks/aws/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/aws/application/istio/kustomize_test.go b/tests/stacks/aws/application/istio/kustomize_test.go deleted file mode 100644 index 46858f4f41..0000000000 --- a/tests/stacks/aws/application/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/stacks/aws/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 426f7f76c3..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "ON" diff --git a/tests/stacks/aws/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml b/tests/stacks/aws/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml deleted file mode 100644 index 67b828a5ee..0000000000 --- a/tests/stacks/aws/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "ON" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-parameters-797cg68672 - namespace: kubeflow diff --git a/tests/stacks/aws/application/jupyter-web-app/kustomize_test.go b/tests/stacks/aws/application/jupyter-web-app/kustomize_test.go deleted file mode 100644 index 4000e044a6..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package jupyter_web_app - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/jupyter-web-app", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index a840da0212..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-24bth2gbkc - name: config-volume diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index fe316c6109..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.$(namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml deleted file mode 100644 index a701dfa71d..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml +++ /dev/null @@ -1,201 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-cpu:1.2.0 - # The list of available standard container Images - options: - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-cpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-gpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-2.1.0-notebook-cpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-2.1.0-notebook-gpu:1.2.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - annotations: {} - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-24bth2gbkc - namespace: kubeflow diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/aws/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/application/oidc-authservice/kustomize_test.go b/tests/stacks/aws/application/oidc-authservice/kustomize_test.go deleted file mode 100644 index 875465f610..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package oidc_authservice - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/oidc-authservice", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml deleted file mode 100644 index d9c3eddc26..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice - namespace: istio-system -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: PersistentVolumeClaim - - group: networking.istio.io - kind: EnvoyFilter - descriptor: - description: Provides OIDC-based authentication for Kubeflow Applications, at - the Istio Gateway. - keywords: - - oidc - - authservice - - authentication - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/oidc-authservice - - description: Docs - url: https://www.kubeflow.org/docs/started/k8s/kfctl-existing-arrikto - maintainers: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - owners: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - type: oidc-authservice - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/instance: oidc-authservice-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: oidc-authservice - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml deleted file mode 100644 index 011c05c390..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - serviceName: authservice - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - spec: - containers: - - env: - - name: USERID_HEADER - value: kubeflow-userid - - name: USERID_PREFIX - value: "" - - name: USERID_CLAIM - value: email - - name: OIDC_PROVIDER - value: http://dex.auth.svc.cluster.local:5556/dex - - name: OIDC_AUTH_URL - value: /dex/auth - - name: OIDC_SCOPES - value: profile email groups - - name: REDIRECT_URL - value: /login/oidc - - name: SKIP_AUTH_URI - value: /dex - - name: PORT - value: "8080" - - name: CLIENT_ID - value: kubeflow-oidc-authservice - - name: CLIENT_SECRET - value: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - - name: STORE_PATH - value: /var/lib/authservice/data.db - image: gcr.io/arrikto/kubeflow/oidc-authservice:28c59ef - imagePullPolicy: Always - name: authservice - ports: - - containerPort: 8080 - name: http-api - readinessProbe: - httpGet: - path: / - port: 8081 - volumeMounts: - - mountPath: /var/lib/authservice - name: data - securityContext: - fsGroup: 111 - volumes: - - name: data - persistentVolumeClaim: - claimName: authservice-pvc diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml deleted file mode 100644 index 510e1df10f..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authn-filter - namespace: istio-system -spec: - filters: - - filterConfig: - httpService: - authorizationRequest: - allowedHeaders: - patterns: - - exact: cookie - - exact: X-Auth-Token - authorizationResponse: - allowedUpstreamHeaders: - patterns: - - exact: kubeflow-userid - serverUri: - cluster: outbound|8080||authservice.istio-system.svc.cluster.local - failureModeAllow: false - timeout: 10s - uri: http://authservice.istio-system.svc.cluster.local - statusOnError: - code: GatewayTimeout - filterName: envoy.ext_authz - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - istio: ingressgateway diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml deleted file mode 100644 index c3193ba74b..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - gatewaySelector: ingressgateway - namespace: istio-system - oidc_auth_url: /dex/auth - oidc_provider: http://dex.auth.svc.cluster.local:5556/dex - oidc_redirect_uri: /login/oidc - skip_auth_uri: /dex - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice-parameters - namespace: istio-system diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml deleted file mode 100644 index 7496a46ef8..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice-pvc - namespace: istio-system -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml b/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml deleted file mode 100644 index 0884d424a4..0000000000 --- a/tests/stacks/aws/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - ports: - - name: http-authservice - port: 8080 - targetPort: http-api - publishNotReadyAddresses: true - selector: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - type: ClusterIP diff --git a/tests/stacks/aws/application/spartakus/kustomize_test.go b/tests/stacks/aws/application/spartakus/kustomize_test.go deleted file mode 100644 index db2c94c6eb..0000000000 --- a/tests/stacks/aws/application/spartakus/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spartakus - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/aws/application/spartakus", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 531fe0dac7..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 6a4c558264..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index f2e0bb974d..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index 9cad7bb143..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index 8572b43906..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - usageId: -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index be719e7753..0000000000 --- a/tests/stacks/aws/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/aws/kustomize_test.go b/tests/stacks/aws/kustomize_test.go deleted file mode 100644 index b92c1cdceb..0000000000 --- a/tests/stacks/aws/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package aws - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/aws", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d75200e308..0000000000 --- a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 9fee938c58..0000000000 --- a/tests/stacks/aws/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml deleted file mode 100644 index f59db66ec0..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml +++ /dev/null @@ -1,156 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpijobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MPIJob - plural: mpijobs - shortNames: - - mj - - mpij - singular: mpijob - scope: Namespaced - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - properties: - spec: - description: Only one of gpus, processingUnits, or replicas should be - specified - oneOf: - - properties: - gpus: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of GPUs - gpusPerNode: - description: Defaults to the number of GPUs per worker - minimum: 1 - title: The maximum number of GPUs available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - gpus - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - processingUnits: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of processing units - processingUnitsPerNode: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The maximum number of processing units available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - processingUnits - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - replicas: - description: The processing resource limit should be specified for - each replica - minimum: 1 - title: Total number of replicas - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - replicas - title: The MPIJob spec - served: false - storage: false - - name: v1alpha2 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: false - - name: v1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: true diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml deleted file mode 100644 index cdb2b4d628..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxjobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MXJob - plural: mxjobs - singular: mxjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - mxReplicaSpecs: - properties: - Scheduler: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Server: - properties: - replicas: - minimum: 1 - type: integer - Tuner: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - TunerServer: - properties: - replicas: - minimum: 1 - type: integer - TunerTracker: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - version: v1 diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/aws/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-alb-ingress-controller.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-alb-ingress-controller.yaml deleted file mode 100644 index a431e5c28b..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-alb-ingress-controller.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: aws-alb-ingress-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Application Load Balancer (ALB) Ingress Controller Deployment Manifest - provides sensible defaults for deploying an ALB Ingress Controller - keywords: - - aws - - kubeflow - links: - - description: About - url: https://github.com/kubernetes-sigs/aws-alb-ingress-controller - maintainers: - - email: shjiaxin@amazon.com - name: Jiaxin Shan - owners: - - email: shjiaxin@amazon.com - name: Jiaxin Shan - type: aws-alb-ingress-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: aws-alb-ingress-controller - app.kubernetes.io/instance: aws-alb-ingress-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: aws-alb-ingress-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-nvidia-device-plugin.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-nvidia-device-plugin.yaml deleted file mode 100644 index 32fa6a8304..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_aws-nvidia-device-plugin.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: aws-nvidia-device-plugin - app.kubernetes.io/name: aws-nvidia-device-plugin - name: aws-nvidia-device-plugin - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: DaemonSet - descriptor: - description: Nvidia Device Plugin for GPU nodes - keywords: - - aws - - nvidia - - kubeflow - links: - - description: About - url: https://github.com/kubernetes/kops/tree/master/hooks/nvidia-device-plugin - maintainers: - - email: shjiaxin@amazon.com - name: Jiaxin Shan - owners: - - email: shjiaxin@amazon.com - name: Jiaxin Shan - type: nvidia-device-plugin - version: v1.0.0-beta - selector: - matchLabels: - app.kubernetes.io/component: aws-nvidia-device-plugin - app.kubernetes.io/instance: nvidia-device-plugin-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: aws-nvidia-device-plugin - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADMAAAAyCAYAAADx/eOPAAALuUlEQVRogd2afWxd9XnHP99bK4pS3yhiGUIRiiJUVVVqbq8ppdR20ibqpuIMtDRkUYERp29J57gMZVuxsrZiK7oZXVv5re1AiOuoG+N1DMkuytprsGPEVMouxqQZJVHEWIdQlGVxZlmZdb/747zcc869jpMO+seOdPz7nd/L83tev89zzjX8Bq795Rq9o17zXp+Tey+Ijkyboela29DRWkhffyT733pH/Z3este9F2cC6N0kNjxtjD+FdRD8UF9X7u97y7UbQFPAivC0BdllS381slun3s3z3xVhhqeds90tqR/oMB7u68z19ZZra0E/l1if3WOziPx3skrDPTr+bvDxfxImEIJbgX6gGBJ7EfHJX/ySReDHwO9KYAenyWCMFKw21GSeslwa2Z17+TcuzPBRr7B8m6Df5oOJqdPAR/u6cm/2lmv3At+IT3GiXZqbcaxSLsfRoTsvn7XL2jE87ZXGnwf+VGiDY86ETM1wU1+XjvSW/RlgTJADQ2QaCZKWcX1/aDIcjE8i3SdzZLjn0lm8pJXD02417BM+gLmq2Rqjr/d16Vu95dp6wc8Ra5O8NrPIcoZCvIR1H+KZkd2qLcfnRYUZOuorJO+3uQt0RerolGYZR7r5+C9ZATwPviGyQprd6Liszy3bnwVKwGMjPbnFyxJmeNpX2T4gaR/QmmSpyYZTho/2depMb9k/kNh3KawuJ1bWauHzUcyXRpZAv5Zmg7aHBLcmNN9ECAFeAO3s69KZ3nLtDuF9dnBs0IT9JO24rbPb0JfP2syCZpFfE5q1mRWcvlgMNcwMTRq9z/+OWXdx4AGjvX1deqC37DbwPwOrMgsufol5mWMWs1ivEbjTrOCtLNNb+udygqsNbUBtopR/NkuuwTJ6Hxsw67KSuvH5MPDA/nJttfGTdUFCMUlp/ALwOtIs9muBxpnFnBzuSQf21oP/BbXclVvumWuTaDN8WNBm2GizJkxPM0CDMA2WGZ72bbb/Njue2TRj9Il/PcG87SeBz4ZTNaSTsmctHcO8SqDp14d7dCFLZ2v/3OpQ023Ah4n65kohvETUCdcsfmuilD+bpNdgGZvOODuHqYGIVGCec9g7+7o031v2jaBTiD0ysxbHRnZrPktzyz1zK7f0z10nh5pWwLRhvZro1KqznVJhNB8UyDeSsU4zAOiIXV1OuEqQ2AR79nflXgcY6dGLwIvR8q39cy1b+uc2Emo6dI824BpMSxz8iVhy4m/2WiYHdV5UmOHp2mpwm52ESCdwRn+9v0tPAWzpn9sAFAQbMdc60PaHsFZEWd9uxk4z8G3seykECfObTEd2KmuZG4CWyLXkYLMwtiYt+hMsTUdAEZQzjs9apv66SHJRk73ZjBQ+iRu29s+1VEr5OImmXs4MHUahVoLWgK23wbv6OrU4OulcuHYehWsVHhpXwpE2FNRayTszX2cwDpQEzTB+QvrJHCXUaigk+c++aXZiE98YmUVgV19X7u3ypH/fgfUA5h2usY2jNjmWoGVn50nvC9T2NviA5OPBGPW91OlG+0Xa1WJhhqadk3WjpKCilQIQFP19XZocnfIHgIeFWyNh6goXyX6gdNWfU8aJ5tNjEheAHZVS/ruGj0s8k6VPhh6ms6kwgoLl1aGuCEuSpwXfHZ2qrTJ+HHkNCpOjmbdFcEcGUIhUSj/H65rPO6j+766U8i/QXV0z8cqJc4btwF8AtWgtMb1wj+j41Df/s1EYQwdEDiqM3hDes9quGY3IKoYOvCrU7HlCoZtEWapPkzEpsU8uq8b36a6uBqaBv5l45URLpZT/pmGH8LnkvlAdAOt1oeXqRsuYTjlEMJiXvWN/Z+5szfqioKcOKo7qr/nAEesKiOyv2A/q88rOx8+8bPhK5dUTAA8jbUT6MuKnbKteNVHKP23xCeD1LC0F2TWOmzoAKEiWxmC+sr8rN1OerF2HGaqXFcZhDWaYj11S4ZxcXxVqyKqPZOeNTwM7Jkr5BeDPQJ8NFQaoC/gZ26rXT5TyxxAfRx6P94d0gU0pYYama+tsbwix/AHM4fKUrwAeB68kRJ5AZsWWieGTjLipsVCgrKCwKHF7pZQ/RXf104j76i4ZMmquxkzRXb2zUsqfxdxsfCiA70hRjZbpCDHmJcRdeZPDHkVck0Ul5PeHZ81DgHxKtglXaHCxVN9fr5TyR9hW3QA8Amqp5526SyKtBEbZVv1eZeZkbqKU7xfsFJwPqRW29s+11oUxnUhnkHf2dWoB+R5Jv5dNaGHh1wog8d/ZAI+0GgVpFPTp4AfJT2Hup7u6EvMk0tpkboutEz0HMPzHyD+mu3pFpZR/Aug0Pgm0RLkvFzLWYfjDvs7cqfKUt2LuXTLhue5mdWhVDJdEzxDDcRKawceN9lRePVkDfgBcR/LKVqNpz/s08DO6q4VKKT8j8zHgJ1HyzA1P11YZjfV1arw85auBR4RalDB5lEjDKi0CgPPphKZ0QiNRwUQeg88B2ydKreew9yH1NCxe/r4GaZpt1Vsrh/JnDDcBLwPkbLVgf6s86RXYj4KvtJKJM8KsGLkSlsmUL6mSg1RJY1xD7KmU8sfprnYgBqJsGVsiEfupsca7FfMo26p/OfHKiVqllB8HyPV16VxfV66G/G1QBwY5xvCgTT7X3/MTaBbFVr0fJvqw2ASZ+yul/FN0V68CHsesiDl3UopM3CwhDZDD/Dnwj3S/sjoYAMqTtc1YX02jVqYOiuuqsAKIkqZCfFIz/IrfFY8gDrKt2gI8irSuwQezyTeNaOl+6qYb+fpYGKEXJE9GSTObK5ItrheaLHE5/XRKcHul+kYN8x2kzWlLNNuVtUqibzKW5CBjxUoszO7NWrS1E/xWvMeJjck2WQHEKJeMD+qH4gWCSvg00m3AVxv5TMRKsp9Cs0Q/Ka/1BOZQNBSXMz2b9Q5oO9JCKgkqg2aKofl8uvTPeE1w3t5KKf8y26pFxINhLRa5R9JV6huT/aZuFu7Ds+A9jBdj+VIvZz2b9BL2Xi5yJQEgUFqinI9SZBDx358o5Q/HiRGtquOEmxJu6DcbC/afQWxnvHg+Odrwm2bP5txh5OEYjOM3vaiu8qqHJw1mPmK/Xs7HJf0LRncDMF5cAL6NWUxDrX/duwbczljxjSzvTX+gtXU3MBlrRCltrsxBTgorACKrRGf5bczOiVLrhUL74B2F9oHVjBd/iLwTWEhr+CIWaLYumDjIWLHha+aSwvRs1iJmJ9Kb9ZJRETS3ACsMC8i1ZNwgXZDYWTmU/1WhfeAW8Cjo+UL7wDrGik8jfid0kYz/Z2ODepv+GPIY+FAznpcUJhAo9w5mh81CFtEsWieCTzwXkogmfKBSyh8ttA98EDPqoPouYqYLxYEPMVY8itmEeTM+KEaqZhVAkiPPIL6QDPhLFiYQSC9J7M3mGlF/24zWSvwIM1xoH2gF/sFiTcSPxQakqUJxsIPx4jGCr0AzCUYTbROJ7DPAdsbSAX9ZwgDs3qTDiMGUOxF/1DgfekLVsPf0sw8DPARsDNwy8iYBXov4p0L7wC2MF99CfBJ4rqmbJbO/qYE+x1jx5HK8Xtp/aFgHDM/FX+RM9FFjHjjj4NV3HvlPsP4g+SqQgm6zCuvJQnHgi4wVz2JuAj8RnLGEVaCf8Y8cuRQ2L0mYEBB2Gb8ZHKD4NQBx+0Qpf7LQPrAVVGqiiWTpCcEn4QcLxcF7C7+aXMDahT1YX5IS5DHE/ZfC4yULEwr0DtIOWwuuvwZ8rVLKP1soDqzHPGJoyRao9b4SXiQQ30A8eO1/PJ8D7gK+BtQSJcQM8AXGlg747LUkmi91lad8J3CuZ5OeBii0D64ET2FdH1N0omWJvgLPkvwM8LmZf7lrnm3VO4CHsM4DH2P8I8vGSfK67P9q8v9wWPAcQLH4PbBHbK6Pq+3M9+Ml+6FL2dyC+WmhOLiWseKPMDeDd12uIPBrWCZ5Xds++AHsAwGlBKnoB5747c2J+aSJEuvRL8CDv/2Zz+cqh/LL/gPD//vrfwFjcI5oX6jDBwAAAABJRU5ErkJggg== - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml deleted file mode 100644 index 1ccc57b61d..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MPIJob - descriptor: - description: Mpi-operator allows users to create and manage the "MPIJob" custom - resource. - keywords: - - mpijob - - mpi-operator - links: - - description: About - url: https://github.com/kubeflow/mpi-operator - maintainers: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: stp.abhi@gmail.com - name: Abhilash Pallerlamudi - owners: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - type: mpi-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/instance: mpi-operator - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mpi-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml deleted file mode 100644 index 328aafbc81..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MXJob - descriptor: - description: mxnet-operator allows users to create and manage the "MXJob" custom - resource. - keywords: - - MXjob - - mxnet-operator - - mxnet-training - links: - - description: About - url: https://github.com/kubeflow/mxnet-operator - maintainers: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - owners: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - type: mxnet-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/instance: mxnet-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mxnet-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/aws/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/aws/test_data/expected/apps_v1_daemonset_nvidia-device-plugin-daemonset.yaml b/tests/stacks/aws/test_data/expected/apps_v1_daemonset_nvidia-device-plugin-daemonset.yaml deleted file mode 100644 index 0d9bfb15fd..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_daemonset_nvidia-device-plugin-daemonset.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app.kubernetes.io/component: aws-nvidia-device-plugin - app.kubernetes.io/name: aws-nvidia-device-plugin - kustomize.component: nvidia-device-plugin - name: nvidia-device-plugin-daemonset - namespace: kubeflow -spec: - selector: - matchLabels: - app.kubernetes.io/component: aws-nvidia-device-plugin - app.kubernetes.io/name: aws-nvidia-device-plugin - kustomize.component: nvidia-device-plugin - template: - metadata: - annotations: - scheduler.alpha.kubernetes.io/critical-pod: "" - labels: - app.kubernetes.io/component: aws-nvidia-device-plugin - app.kubernetes.io/name: aws-nvidia-device-plugin - kustomize.component: nvidia-device-plugin - spec: - containers: - - image: nvidia/k8s-device-plugin:1.0.0-beta4 - name: nvidia-device-plugin-ctr - securityContext: - allowPrivilegeEscalation: false - capabilities: - drop: - - ALL - volumeMounts: - - mountPath: /var/lib/kubelet/device-plugins - name: device-plugin - tolerations: - - key: CriticalAddonsOnly - operator: Exists - - effect: NoSchedule - key: nvidia.com/gpu - operator: Exists - volumes: - - hostPath: - path: /var/lib/kubelet/device-plugins - name: device-plugin - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_alb-ingress-controller.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_alb-ingress-controller.yaml deleted file mode 100644 index 8b2b85d376..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_alb-ingress-controller.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: alb-ingress-controller - namespace: kubeflow -spec: - selector: - matchLabels: - app: aws-alb-ingress-controller - app.kubernetes.io/name: alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: aws-alb-ingress-controller - app.kubernetes.io/name: alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - spec: - containers: - - args: - - --ingress-class=alb - - --cluster-name=$(CLUSTER_NAME) - env: - - name: CLUSTER_NAME - valueFrom: - configMapKeyRef: - key: cluster-name - name: aws-alb-ingress-controller-config - image: docker.io/amazon/aws-alb-ingress-controller:v1.1.5 - imagePullPolicy: Always - name: alb-ingress-controller - serviceAccountName: alb-ingress-controller diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 754f9eab51..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index a840da0212..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-24bth2gbkc - name: config-volume diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 98db002664..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index b83ace1849..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mpi-operator.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_mpi-operator.yaml deleted file mode 100644 index 0c1efb4e29..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mpi-operator.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - spec: - containers: - - args: - - -alsologtostderr - - --lock-namespace - - kubeflow - - --kubectl-delivery-image - - mpioperator/kubectl-delivery:latest - image: mpioperator/mpi-operator:latest - imagePullPolicy: Always - name: mpi-operator - serviceAccountName: mpi-operator diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mxnet-operator.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_mxnet-operator.yaml deleted file mode 100644 index a0724c00d7..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mxnet-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - spec: - containers: - - command: - - /opt/kubeflow/mxnet-operator.v1 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: kubeflow/mxnet-operator:v1.0.0-20200625 - imagePullPolicy: Always - name: mxnet-operator - serviceAccountName: mxnet-operator diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 1e207f863e..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 8069350e8c..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/aws/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/aws/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/aws/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/aws/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/aws/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml b/tests/stacks/aws/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml deleted file mode 100644 index d80509f7d0..0000000000 --- a/tests/stacks/aws/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: anonymous - namespace: kubeflow -spec: - owner: - kind: User - name: anonymous diff --git a/tests/stacks/aws/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/aws/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/aws/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/aws/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_alb-ingress-controller.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_alb-ingress-controller.yaml deleted file mode 100644 index 4d857abef8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_alb-ingress-controller.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: alb-ingress-controller -rules: -- apiGroups: - - "" - - extensions - resources: - - configmaps - - endpoints - - events - - ingresses - - ingresses/status - - services - verbs: - - create - - get - - list - - update - - watch - - patch -- apiGroups: - - "" - - extensions - resources: - - nodes - - pods - - secrets - - services - - namespaces - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml deleted file mode 100644 index 8afc1cd608..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mpijobs-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml deleted file mode 100644 index 598c7c7b7b..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" - name: kubeflow-mpijobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml deleted file mode 100644 index b3ef136d77..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mpijobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml deleted file mode 100644 index 7292a7b4b9..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mxjobs-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml deleted file mode 100644 index a6778579cd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" - name: kubeflow-mxjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml deleted file mode 100644 index 8abdd41f86..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mxjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml deleted file mode 100644 index 9ef4b587b5..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml +++ /dev/null @@ -1,107 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - verbs: - - create - - list - - watch -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - pods/exec - verbs: - - create -- apiGroups: - - "" - resources: - - endpoints - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - create - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - list - - update - - watch -- apiGroups: - - apps - resources: - - statefulsets - verbs: - - create - - list - - update - - watch -- apiGroups: - - batch - resources: - - jobs - verbs: - - create - - list - - update - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/finalizers - - mpijobs/status - verbs: - - '*' -- apiGroups: - - scheduling.incubator.k8s.io - - scheduling.sigs.dev - resources: - - queues - - podgroups - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_alb-ingress-controller.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_alb-ingress-controller.yaml deleted file mode 100644 index 68da483986..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_alb-ingress-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: alb-ingress-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: alb-ingress-controller -subjects: -- kind: ServiceAccount - name: alb-ingress-controller - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml deleted file mode 100644 index 5ceb1390e6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mpi-operator -subjects: -- kind: ServiceAccount - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml deleted file mode 100644 index 0008889d3b..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - - pods - - services - - endpoints - - persistentvolumeclaims - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml deleted file mode 100644 index 09c59a95a9..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mxnet-operator -subjects: -- kind: ServiceAccount - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/aws/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/aws/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_aws-alb-ingress-controller-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_aws-alb-ingress-controller-config.yaml deleted file mode 100644 index d778e5ec5d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_aws-alb-ingress-controller-config.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - cluster-name: test -kind: ConfigMap -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: aws-alb-ingress-controller-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index d0a3b92203..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,113 +0,0 @@ -apiVersion: v1 -data: - centraldashboard_links_config.yaml: "apiVersion: v1\ndata:\n links: |-\n {\n - \ \"menuLinks\": [\n {\n \"link\": \"/pipeline/\",\n \"text\": - \"Pipelines\"\n },\n {\n \"link\": \"/jupyter/\",\n \"text\": - \"Notebook Servers\"\n },\n {\n \"link\": \"/katib/\",\n - \ \"text\": \"Katib\"\n }\n ],\n \"externalLinks\": [],\n - \ \"quickLinks\": [\n {\n \"text\": \"Upload a pipeline\",\n - \ \"desc\": \"Pipelines\",\n \"link\": \"/pipeline/\"\n },\n - \ {\n \"text\": \"View all pipeline runs\",\n \"desc\": - \"Pipelines\",\n \"link\": \"/pipeline/#/runs\"\n },\n {\n - \ \"text\": \"Create a new Notebook server\",\n \"desc\": \"Notebook - Servers\",\n \"link\": \"/jupyter/new?namespace=kubeflow\"\n },\n - \ {\n \"text\": \"View Katib Experiments\",\n \"desc\": - \"Katib\",\n \"link\": \"/katib/\"\n }\n ],\n \"documentationItems\": - [\n {\n \"text\": \"Getting Started with Kubeflow\",\n \"desc\": - \"Get your machine-learning workflow up and running on Kubeflow\",\n \"link\": - \"https://www.kubeflow.org/docs/started/getting-started/\"\n },\n {\n - \ \"text\": \"EKS Kubeflow Examples\",\n \"desc\": \"Get your - step-by-step guidance for Kubeflow on AWS\",\n \"link\": \"https://github.com/aws-samples/eks-kubeflow-workshop\"\n - \ }, \n {\n \"text\": \"Kubeflow on AWS\",\n \"desc\": - \"Running Kubeflow on Elastic Container Service and Amazon Web Services\",\n \"link\": - \"https://www.kubeflow.org/docs/aws/\"\n },\n {\n \"text\": - \"Requirements for Kubeflow\",\n \"desc\": \"Get more detailed information - about using Kubeflow and its components\",\n \"link\": \"https://www.kubeflow.org/docs/started/requirements/\"\n - \ }\n ]\n }\nkind: ConfigMap\nmetadata:\n name: centraldashboard-links-config\n" - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - annotations: {} - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml deleted file mode 100644 index 0af9fe8d4b..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - profile-name: anonymous - user: anonymous -kind: ConfigMap -metadata: - name: default-install-config-h877hbtmf7 - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml deleted file mode 100644 index a701dfa71d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-24bth2gbkc.yaml +++ /dev/null @@ -1,201 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-cpu:1.2.0 - # The list of available standard container Images - options: - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-cpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-1.15.2-notebook-gpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-2.1.0-notebook-cpu:1.2.0 - - 527798164940.dkr.ecr.us-west-2.amazonaws.com/tensorflow-2.1.0-notebook-gpu:1.2.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - annotations: {} - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-24bth2gbkc - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-config.yaml deleted file mode 100644 index 1deb5ff28a..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-config.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml deleted file mode 100644 index ff54ae481a..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - kubectl-delivery-image: mpioperator/kubectl-delivery:latest - lock-namespace: kubeflow -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9d9b1dcd68..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 0f695c21ce..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/aws/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/aws/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/aws/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/aws/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/aws/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/aws/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 8625b1f0ae..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/aws/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml deleted file mode 100644 index f773281c4f..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_alb-ingress-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: aws-alb-ingress-controller - kustomize.component: aws-alb-ingress-controller - name: alb-ingress-controller - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml deleted file mode 100644 index dbe19ff814..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml deleted file mode 100644 index 668c2e0f1d..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/aws/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/kustomize_test.go b/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/kustomize_test.go deleted file mode 100644 index 88052a4659..0000000000 --- a/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package add_anonymous_user_filter_istio_1_6 - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/add-anonymous-user-filter-istio-1-6", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml b/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml deleted file mode 100644 index 807338f755..0000000000 --- a/tests/stacks/azure/application/add-anonymous-user-filter-istio-1-6/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - name: add-user-filter - namespace: istio-system -spec: - configPatches: - - applyTo: HTTP_FILTER - match: - context: GATEWAY - listener: - filterChain: - filter: - name: envoy.http_connection_manager - subFilter: - name: envoy.router - patch: - operation: INSERT_BEFORE - value: - name: envoy.lua - typed_config: - '@type': type.googleapis.com/envoy.config.filter.http.lua.v2.Lua - inlineCode: | - function envoy_on_request(request_handle) - request_handle:headers():add("kubeflow-userid","anonymous@kubeflow.org") - end - workloadSelector: - labels: - app: istio-ingressgateway diff --git a/tests/stacks/azure/application/centraldashboard/kustomize_test.go b/tests/stacks/azure/application/centraldashboard/kustomize_test.go deleted file mode 100644 index ad12776cfb..0000000000 --- a/tests/stacks/azure/application/centraldashboard/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package centraldashboard - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/centraldashboard", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 754f9eab51..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index dae2cb2961..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.$(namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index 1fec89e08f..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Kubeflow Overview", - "desc": "An overview of Kubeflow architecture and workflows", - "link": "https://www.kubeflow.org/docs/started/kubeflow-overview/" - }, - { - "text": "Kubeflow on Azure", - "desc": "Running Kubeflow on AKS and Microsoft Azure", - "link": "https://www.kubeflow.org/docs/azure/" - }, - { - "text": "Azure Machine Learning Docs", - "desc": "Azure Machine Learning Documentation", - "link": "https://aka.ms/kubeflow-azureml-docs" - }, - { - "text": "Azure Kubernetes Service Docs", - "desc": "Azure Kubernetes Service Documentation", - "link": "https://aka.ms/kubeflow-aks-docs" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/azure/application/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/application/cert-manager-crds/kustomize_test.go b/tests/stacks/azure/application/cert-manager-crds/kustomize_test.go deleted file mode 100644 index b56cc705ae..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/stacks/azure/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/kustomize_test.go b/tests/stacks/azure/application/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index f72dbf419f..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index d8e47f2a94..0000000000 --- a/tests/stacks/azure/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/stacks/azure/application/cert-manager/kustomize_test.go b/tests/stacks/azure/application/cert-manager/kustomize_test.go deleted file mode 100644 index 6b9c9bba3d..0000000000 --- a/tests/stacks/azure/application/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 93e06c4304..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 36a2524012..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 21cdee5406..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 09a9cfab99..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index 6ae84bc8c0..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 33ab9729d5..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index 8a116d7b30..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 2a25e06d49..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 6ce5b8e0cc..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index f62a08529b..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index b0d464bfd5..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index ce897a6a3b..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index ad80b32de5..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index fb0a1201cf..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bea275aa9c..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index a276b13742..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index 13b98eeaae..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index d5f2de3e1b..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index bd1d73f13b..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 80792a8f24..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 7ee5331ba6..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bbc5ee440a..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 6a79270953..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index 854ffd11fe..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index 137f15e731..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index b19073be57..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index f40a39080a..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index d0a3fd2d22..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index adb10f9073..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index b25a401652..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index e71b15aaa6..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index 11c24d45c8..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index 882e257d96..0000000000 --- a/tests/stacks/azure/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/kustomize_test.go b/tests/stacks/azure/application/istio-1-3-1-stack/kustomize_test.go deleted file mode 100644 index 09a7ad62d7..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_1_3_1_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/istio-1-3-1-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index d7aa03f87d..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 7edbd19816..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-adapter - kustomize.component: istio-crds - package: adapter - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index 7864def1ea..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml deleted file mode 100644 index 1180849525..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: authorizationpolicies.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: AuthorizationPolicy - plural: authorizationpolicies - singular: authorizationpolicy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 2a4631cf5e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 138b667371..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index f0e7d55b9d..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 6a7257c6db..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 00470c08e2..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index d3560e8cbb..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index 787adcd33c..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index d08bd06c40..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-handler - kustomize.component: istio-crds - package: handler - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 5efdd1c1bd..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index f3c47edcf6..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 106fb5f240..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-instance - kustomize.component: istio-crds - package: instance - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index 18ab2ea4c9..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 8acfb192f2..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 796c9fa8e6..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index 7f6d447e54..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index cf34ff9565..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 782ac3f591..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 420974db07..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index e57f11c367..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index e52b86065a..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index bb19b9a158..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index f8b6e02a93..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index dcb1f2185e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 57df1e0445..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-template - kustomize.component: istio-crds - package: template - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index 26e9eb1a10..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml deleted file mode 100644 index ac07dec74a..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app: nodeagent - istio: nodeagent - name: istio-nodeagent - namespace: istio-system -spec: - selector: - matchLabels: - istio: nodeagent - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: nodeagent - istio: nodeagent - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: CA_ADDR - value: istio-citadel:8060 - - name: CA_PROVIDER - value: Citadel - - name: PLUGINS - value: "" - - name: VALID_TOKEN - value: "true" - - name: TRUST_DOMAIN - value: "" - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/istio-release/node-agent-k8s:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: nodeagent - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - serviceAccountName: istio-nodeagent-service-account - tolerations: - - effect: NoExecute - operator: Exists - - effect: NoSchedule - operator: Exists - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 71d2e3470e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: citadel - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - istio: citadel - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --sds-enabled=true - - --append-dns-names=true - - --grpc-port=8060 - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - - --workload-cert-ttl=2160h - env: - - name: CITADEL_ENABLE_NAMESPACES_BY_DEFAULT - value: "true" - image: gcr.io/istio-release/citadel:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 5b344bf192..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: galley - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - istio: galley - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=false - - --validation-webhook-config-file - - /etc/config/validating-webhook-configuration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - image: gcr.io/istio-release/galley:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 61171d41be..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - istio: ingressgateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - MUTUAL_TLS - - --discoveryAddress - - istio-pilot:15011 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "true" - - name: ISTIO_META_WORKLOAD_NAME - value: istio-ingressgateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/istio-ingressgateway - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 2287dd6a98..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - istio: pilot - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "1" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_OUTBOUND - value: "true" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_INBOUND - value: "false" - image: gcr.io/istio-release/pilot:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - requests: - cpu: 500m - memory: 2048Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - serviceAccountName: istio-pilot-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 27069e1098..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - istio: mixer - istio-mixer-type: policy - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --useTemplateCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index c2ef009a0f..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,117 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: sidecar-injector - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: gcr.io/istio-release/sidecar_injector:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - - key: values - path: values - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index dc32c6d0e8..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --certFile=/etc/certs/cert-chain.pem - - --keyFile=/etc/certs/key.pem - - --caCertFile=/etc/certs/root-cert.pem - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 4800m - memory: 4G - requests: - cpu: 1000m - memory: 1G - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index bd61a789cb..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yaml - image: docker.io/prom/prometheus:v2.8.0 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index b11d522036..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 5c0aeb158b..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index 96d1bb443e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index f8de3ad33a..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml deleted file mode 100644 index bc3e9b5c7e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - labels: - app: security - name: istio-security-post-install-release-1.3-latest-daily - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/istio-security-run.sh - - /tmp/security/istio-security-custom-resources.yaml - image: gcr.io/istio-release/kubectl:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index 194c9f3e74..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.proxy_version: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 2b48f38df5..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 6eb5203232..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 591f65ede8..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,213 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml deleted file mode 100644 index def828bfeb..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: attributes - namespace: istio-system -spec: - attributeBindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - compiledTemplate: kubernetes - params: - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml deleted file mode 100644 index d36350d7ce..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestcount - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml deleted file mode 100644 index e8e7f5cae8..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestduration - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml deleted file mode 100644 index 92a052306a..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestsize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml deleted file mode 100644 index 8fa51f640f..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: responsesize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml deleted file mode 100644 index 17059fe110..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytereceived - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml deleted file mode 100644 index 2916bd6d5c..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytesent - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml deleted file mode 100644 index a11ed65696..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsclosed - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml deleted file mode 100644 index a54cf0fefc..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsopened - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 4f64a20efa..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 1bf9b97a14..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount - - requestduration - - requestsize - - responsesize - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) && (match((request.useragent | "-"), "Prometheus*") - == false) diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index ba53469288..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent - - tcpbytereceived - match: context.protocol == "tcp" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 88b56a9f61..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index d6a57b5eb4..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 359f4d4d82..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes - match: context.protocol == "tcp" diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 6bb534ca87..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index dcc865c1ce..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 504e447036..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 8ab724961f..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 48ef2e374c..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ab4d9b137..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - istio: mixer - istio-mixer-type: policy - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml deleted file mode 100644 index 6b92933e30..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - istio: sidecar-injector diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index af62a9392d..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index b2b648f7bf..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - namespaces - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index b07c27bde8..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index e891d1f64e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 712d854b96..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fba93e72ed..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index e058905249..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 7dcde2e12d..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index f3d3217415..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 356d3081d9..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 0c41554f71..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 3cf724b359..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 416d69e15c..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-nodeagent-istio-system -subjects: -- kind: ServiceAccount - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index eb97384bfa..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index 53b0c9ba50..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index ee14afcdaa..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 0d6ca7e082..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 7516510d7e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml deleted file mode 100644 index ccd2b2092a..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - rules: - - services: - - istio-ingressgateway.istio-system.svc.cluster.local diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml deleted file mode 100644 index 91340ebbb5..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - roleRef: - kind: ServiceRole - name: istio-ingressgateway - subjects: - - user: '*' diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index 81512e2b6c..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,120 +0,0 @@ -apiVersion: v1 -data: - validating-webhook-configuration.yaml: | - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - labels: - app: galley - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - sideEffects: None - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - - adapters - - handlers - - instances - - templates - - zipkins - failurePolicy: Fail - sideEffects: None -kind: ConfigMap -metadata: - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml deleted file mode 100644 index db0e477760..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - name: istio-install-parameters-5kmkd2f29g - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 3e86dfa9f0..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: v1 -data: - istio-security-custom-resources.yaml: | - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - spec: - peers: - - mtls: - mode: PERMISSIVE - istio-security-run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index af6866c735..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,405 +0,0 @@ -apiVersion: v1 -data: - config: |- - policy: enabled - alwaysInjectSelector: - [] - neverInjectSelector: - [] - template: |- - rewriteAppHTTPProbe: {{ valueOrDefault .Values.sidecarInjectorWebhook.rewriteAppHTTPProbe false }} - {{- if or (not .Values.istio_cni.enabled) .Values.global.proxy.enableCoreDump }} - initContainers: - {{ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `NONE` }} - {{- if not .Values.istio_cni.enabled }} - - name: istio-init - {{- if contains "/" .Values.global.proxy_init.image }} - image: "{{ .Values.global.proxy_init.image }}" - {{- else }} - image: "{{ .Values.global.hub }}/{{ .Values.global.proxy_init.image }}:{{ .Values.global.tag }}" - {{- end }} - args: - - "-p" - - "15001" - - "-z" - - "15006" - - "-u" - - 1337 - - "-m" - - "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - - "-i" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - - "-x" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - - "-b" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` `*` }}" - - "-d" - - "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") -}} - - "-o" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{ end -}} - {{ if (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -}} - - "-k" - - "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - {{ end -}} - imagePullPolicy: "{{ .Values.global.imagePullPolicy }}" - {{- if .Values.global.proxy.init.resources }} - resources: - {{ toYaml .Values.global.proxy.init.resources | indent 4 }} - {{- else }} - resources: {} - {{- end }} - securityContext: - runAsUser: 0 - runAsNonRoot: false - capabilities: - add: - - NET_ADMIN - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - restartPolicy: Always - {{- end }} - {{ end -}} - {{- if eq .Values.global.proxy.enableCoreDump true }} - - name: enable-core-dump - args: - - -c - - sysctl -w kernel.core_pattern=/var/lib/istio/core.proxy && ulimit -c unlimited - command: - - /bin/sh - image: {{ $.Values.global.proxy.enableCoreDumpImage }} - imagePullPolicy: IfNotPresent - resources: {} - securityContext: - runAsUser: 0 - runAsNonRoot: false - privileged: true - {{ end }} - {{- end }} - containers: - - name: istio-proxy - {{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}" - {{- else }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.hub }}/{{ .Values.global.proxy.image }}:{{ .Values.global.tag }}" - {{- end }} - ports: - - containerPort: 15090 - protocol: TCP - name: http-envoy-prom - args: - - proxy - - sidecar - - --domain - - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }} - - --configPath - - "{{ .ProxyConfig.ConfigPath }}" - - --binaryPath - - "{{ .ProxyConfig.BinaryPath }}" - - --serviceCluster - {{ if ne "" (index .ObjectMeta.Labels "app") -}} - - "{{ index .ObjectMeta.Labels `app` }}.$(POD_NAMESPACE)" - {{ else -}} - - "{{ valueOrDefault .DeploymentMeta.Name `istio-proxy` }}.{{ valueOrDefault .DeploymentMeta.Namespace `default` }}" - {{ end -}} - - --drainDuration - - "{{ formatDuration .ProxyConfig.DrainDuration }}" - - --parentShutdownDuration - - "{{ formatDuration .ProxyConfig.ParentShutdownDuration }}" - - --discoveryAddress - - "{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}" - {{- if eq .Values.global.proxy.tracer "lightstep" }} - - --lightstepAddress - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAddress }}" - - --lightstepAccessToken - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAccessToken }}" - - --lightstepSecure={{ .ProxyConfig.GetTracing.GetLightstep.GetSecure }} - - --lightstepCacertPath - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }}" - {{- else if eq .Values.global.proxy.tracer "zipkin" }} - - --zipkinAddress - - "{{ .ProxyConfig.GetTracing.GetZipkin.GetAddress }}" - {{- else if eq .Values.global.proxy.tracer "datadog" }} - - --datadogAgentAddress - - "{{ .ProxyConfig.GetTracing.GetDatadog.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.logLevel }} - - --proxyLogLevel={{ .Values.global.proxy.logLevel }} - {{- end}} - {{- if .Values.global.proxy.componentLogLevel }} - - --proxyComponentLogLevel={{ .Values.global.proxy.componentLogLevel }} - {{- end}} - - --dnsRefreshRate - - {{ .Values.global.proxy.dnsRefreshRate }} - - --connectTimeout - - "{{ formatDuration .ProxyConfig.ConnectTimeout }}" - {{- if .Values.global.proxy.envoyStatsd.enabled }} - - --statsdUdpAddress - - "{{ .ProxyConfig.StatsdUdpAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyMetricsService.enabled }} - - --envoyMetricsServiceAddress - - "{{ .ProxyConfig.GetEnvoyMetricsService.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyAccessLogService.enabled }} - - --envoyAccessLogService - - '{{ structToJSON .ProxyConfig.EnvoyAccessLogService }}' - {{- end }} - - --proxyAdminPort - - "{{ .ProxyConfig.ProxyAdminPort }}" - {{ if gt .ProxyConfig.Concurrency 0 -}} - - --concurrency - - "{{ .ProxyConfig.Concurrency }}" - {{ end -}} - - --controlPlaneAuthPolicy - - "{{ annotation .ObjectMeta `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy }}" - {{- if (ne (annotation .ObjectMeta "status.sidecar.istio.io/port" .Values.global.proxy.statusPort) "0") }} - - --statusPort - - "{{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }}" - - --applicationPorts - - "{{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` (applicationPorts .Spec.Containers) }}" - {{- end }} - {{- if .Values.global.trustDomain }} - - --trust-domain={{ .Values.global.trustDomain }} - {{- end }} - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_POD_PORTS - value: |- - [ - {{- range $index1, $c := .Spec.Containers }} - {{- range $index2, $p := $c.Ports }} - {{if or (ne $index1 0) (ne $index2 0)}},{{end}}{{ structToJSON $p }} - {{- end}} - {{- end}} - ] - - name: ISTIO_META_CLUSTER_ID - value: "{{ valueOrDefault .Values.global.multicluster.clusterName `Kubernetes` }}" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - {{- if eq .Values.global.proxy.tracer "datadog" }} - - name: HOST_IP - valueFrom: - fieldRef: - fieldPath: status.hostIP - {{- if isset .ObjectMeta.Annotations `apm.datadoghq.com/env` }} - {{- range $key, $value := fromJSON (index .ObjectMeta.Annotations `apm.datadoghq.com/env`) }} - - name: {{ $key }} - value: "{{ $value }}" - {{- end }} - {{- end }} - {{- end }} - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: {{ $.Values.global.sds.enabled }} - - name: ISTIO_META_INTERCEPTION_MODE - value: "{{ or (index .ObjectMeta.Annotations `sidecar.istio.io/interceptionMode`) .ProxyConfig.InterceptionMode.String }}" - - name: ISTIO_META_INCLUDE_INBOUND_PORTS - value: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (applicationPorts .Spec.Containers) }}" - {{- if .Values.global.network }} - - name: ISTIO_META_NETWORK - value: "{{ .Values.global.network }}" - {{- end }} - {{ if .ObjectMeta.Annotations }} - - name: ISTIO_METAJSON_ANNOTATIONS - value: | - {{ toJSON .ObjectMeta.Annotations }} - {{ end }} - {{ if .ObjectMeta.Labels }} - - name: ISTIO_METAJSON_LABELS - value: | - {{ toJSON .ObjectMeta.Labels }} - {{ end }} - {{- if .DeploymentMeta.Name }} - - name: ISTIO_META_WORKLOAD_NAME - value: {{ .DeploymentMeta.Name }} - {{ end }} - {{- if and .TypeMeta.APIVersion .DeploymentMeta.Name }} - - name: ISTIO_META_OWNER - value: kubernetes://api/{{ .TypeMeta.APIVersion }}/namespaces/{{ valueOrDefault .DeploymentMeta.Namespace `default` }}/{{ toLower .TypeMeta.Kind}}s/{{ .DeploymentMeta.Name }} - {{- end}} - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: ISTIO_BOOTSTRAP_OVERRIDE - value: "/etc/istio/custom-bootstrap/custom_bootstrap.json" - {{- end }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: ISTIO_META_SDS_TOKEN_PATH - value: "{{ .Values.global.sds.customTokenDirectory -}}/sdstoken" - {{- end }} - {{- if .Values.global.meshID }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.meshID }}" - {{- else if .Values.global.trustDomain }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.trustDomain }}" - {{- end }} - imagePullPolicy: {{ .Values.global.imagePullPolicy }} - {{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }} - readinessProbe: - httpGet: - path: /healthz/ready - port: {{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }} - initialDelaySeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` .Values.global.proxy.readinessInitialDelaySeconds }} - periodSeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` .Values.global.proxy.readinessPeriodSeconds }} - failureThreshold: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` .Values.global.proxy.readinessFailureThreshold }} - {{ end -}} - securityContext: - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - {{- if ne .Values.global.proxy.enableCoreDump true }} - readOnlyRootFilesystem: true - {{- end }} - {{ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY` -}} - capabilities: - add: - - NET_ADMIN - runAsGroup: 1337 - {{ else -}} - {{ if .Values.global.sds.enabled }} - runAsGroup: 1337 - {{- end }} - runAsUser: 1337 - {{- end }} - resources: - {{ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - requests: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -}} - cpu: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` }}" - {{ end}} - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - memory: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` }}" - {{ end }} - {{ else -}} - {{- if .Values.global.proxy.resources }} - {{ toYaml .Values.global.proxy.resources | indent 4 }} - {{- end }} - {{ end -}} - volumeMounts: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - mountPath: /etc/istio/custom-bootstrap - name: custom-bootstrap-volume - {{- end }} - - mountPath: /etc/istio/proxy - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - {{- if .Values.global.sds.customTokenDirectory }} - - mountPath: "{{ .Values.global.sds.customTokenDirectory -}}" - name: custom-sds-token - readOnly: true - {{- end }} - {{- else }} - - mountPath: /etc/certs/ - name: istio-certs - readOnly: true - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - mountPath: {{ directory .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }} - name: lightstep-certs - readOnly: true - {{- end }} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` }} - {{ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 4 }} - {{ end }} - {{- end }} - volumes: - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: custom-bootstrap-volume - configMap: - name: {{ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` "" }} - {{- end }} - - emptyDir: - medium: Memory - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - name: sds-uds-path - hostPath: - path: /var/run/sds - - name: istio-token - projected: - sources: - - serviceAccountToken: - path: istio-token - expirationSeconds: 43200 - audience: {{ .Values.global.sds.token.aud }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: custom-sds-token - secret: - secretName: sdstokensecret - {{- end }} - {{- else }} - - name: istio-certs - secret: - optional: true - {{ if eq .Spec.ServiceAccountName "" }} - secretName: istio.default - {{ else -}} - secretName: {{ printf "istio.%s" .Spec.ServiceAccountName }} - {{ end -}} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` }} - {{range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 2 }} - {{ end }} - {{ end }} - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - name: lightstep-certs - secret: - optional: true - secretName: lightstep.cacert - {{- end }} - {{- if .Values.global.podDNSSearchNamespaces }} - dnsConfig: - searches: - {{- range .Values.global.podDNSSearchNamespaces }} - - {{ render . }} - {{- end }} - {{- end }} - podRedirectAnnot: - sidecar.istio.io/interceptionMode: "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - traffic.sidecar.istio.io/includeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - traffic.sidecar.istio.io/excludeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - traffic.sidecar.istio.io/includeInboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (includeInboundPorts .Spec.Containers) }}" - traffic.sidecar.istio.io/excludeInboundPorts: "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") }} - traffic.sidecar.istio.io/excludeOutboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{- end }} - traffic.sidecar.istio.io/kubevirtInterfaces: "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - values: '{"certmanager":{"enabled":false},"galley":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"galley","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"gateways":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"istio-egressgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"labels":{"app":"istio-egressgateway","istio":"egressgateway"},"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"http2","port":80},{"name":"https","port":443},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/egressgateway-certs","name":"egressgateway-certs","secretName":"istio-egressgateway-certs"},{"mountPath":"/etc/istio/egressgateway-ca-certs","name":"egressgateway-ca-certs","secretName":"istio-egressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"ClusterIP"},"istio-ilbgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"labels":{"app":"istio-ilbgateway","istio":"ilbgateway"},"loadBalancerIP":"","nodeSelector":{},"podAnnotations":{},"ports":[{"name":"grpc-pilot-mtls","port":15011},{"name":"grpc-pilot","port":15010},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns","port":5353}],"resources":{"requests":{"cpu":"800m","memory":"512Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/ilbgateway-certs","name":"ilbgateway-certs","secretName":"istio-ilbgateway-certs"},{"mountPath":"/etc/istio/ilbgateway-ca-certs","name":"ilbgateway-ca-certs","secretName":"istio-ilbgateway-ca-certs"}],"serviceAnnotations":{"cloud.google.com/load-balancer-type":"internal"},"tolerations":[],"type":"LoadBalancer"},"istio-ingressgateway":{"applicationPorts":"","autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"externalIPs":[],"labels":{"app":"istio-ingressgateway","istio":"ingressgateway"},"loadBalancerIP":"","loadBalancerSourceRanges":[],"meshExpansionPorts":[{"name":"tcp-pilot-grpc-tls","port":15011,"targetPort":15011},{"name":"tcp-mixer-grpc-tls","port":15004,"targetPort":15004},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns-tls","port":853,"targetPort":853}],"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"status-port","port":15020,"targetPort":15020},{"name":"http2","nodePort":31380,"port":80,"targetPort":80},{"name":"https","nodePort":31390,"port":443},{"name":"tcp","nodePort":31400,"port":31400},{"name":"https-kiali","port":15029,"targetPort":15029},{"name":"https-prometheus","port":15030,"targetPort":15030},{"name":"https-grafana","port":15031,"targetPort":15031},{"name":"https-tracing","port":15032,"targetPort":15032},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sds":{"enabled":false,"image":"node-agent-k8s","resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}},"secretVolumes":[{"mountPath":"/etc/istio/ingressgateway-certs","name":"ingressgateway-certs","secretName":"istio-ingressgateway-certs"},{"mountPath":"/etc/istio/ingressgateway-ca-certs","name":"ingressgateway-ca-certs","secretName":"istio-ingressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"LoadBalancer"}},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"grafana":{"enabled":false},"istio_cni":{"enabled":false},"istiocoredns":{"enabled":false},"kiali":{"enabled":false},"mixer":{"adapters":{"kubernetesenv":{"enabled":true},"prometheus":{"enabled":true,"metricsExpiryDuration":"10m"},"stdio":{"enabled":false,"outputAsJson":true},"useAdapterCRDs":false},"env":{"GODEBUG":"gctrace=1","GOMAXPROCS":"6"},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"mixer","nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"policy":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%"},"telemetry":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"loadshedding":{"latencyThreshold":"100ms","mode":"enforce"},"replicaCount":1,"reportBatchMaxEntries":100,"reportBatchMaxTime":"1s","resources":{"limits":{"cpu":"4800m","memory":"4G"},"requests":{"cpu":"1000m","memory":"1G"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sessionAffinityEnabled":false},"tolerations":[]},"nodeagent":{"enabled":true,"env":{"CA_ADDR":"istio-citadel:8060","CA_PROVIDER":"Citadel","PLUGINS":"","VALID_TOKEN":true},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"node-agent-k8s","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"tolerations":[]},"pilot":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enableProtocolSniffingForInbound":false,"enableProtocolSniffingForOutbound":true,"enabled":true,"env":{"GODEBUG":"gctrace=1","PILOT_PUSH_THROTTLE":100},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"pilot","keepaliveMaxServerConnectionAge":"30m","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"resources":{"requests":{"cpu":"500m","memory":"2048Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sidecar":true,"tolerations":[],"traceSampling":1},"prometheus":{"contextPath":"/prometheus","enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"hub":"docker.io/prom","image":"prometheus","ingress":{"annotations":null,"enabled":false,"hosts":["prometheus.local"],"tls":null},"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"retention":"6h","scrapeInterval":"15s","security":{"enabled":true},"service":{"annotations":{},"nodePort":{"enabled":false,"port":32090}},"tag":"v2.8.0","tolerations":[]},"security":{"citadelHealthCheck":false,"createMeshPolicy":true,"enableNamespacesByDefault":true,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"citadel","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","selfSigned":true,"tolerations":[],"workloadCertTtl":"2160h"},"sidecarInjectorWebhook":{"alwaysInjectSelector":[],"enableNamespacesByDefault":false,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"sidecar_injector","neverInjectSelector":[],"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rewriteAppHTTPProbe":false,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"tracing":{"enabled":false}}' -kind: ConfigMap -metadata: - labels: - app: istio - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index 212eae498f..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: v1 -data: - mesh: |- - # Set the following variable to true to disable policy checks by the Mixer. - # Note that metrics will still be reported to the Mixer. - disablePolicyChecks: true - # reportBatchMaxEntries is the number of requests that are batched before telemetry data is sent to the mixer server - reportBatchMaxEntries: 100 - # reportBatchMaxTime is the max waiting time before the telemetry data of a request is sent to the mixer server - reportBatchMaxTime: 1s - - # Set enableTracing to false to disable request tracing. - enableTracing: true - - # Set accessLogFile to empty string to disable access log. - accessLogFile: "" - - # If accessLogEncoding is TEXT, value will be used directly as the log format - # example: "[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\n" - # If AccessLogEncoding is JSON, value will be parsed as map[string]string - # example: '{"start_time": "%START_TIME%", "req_method": "%REQ(:METHOD)%"}' - # Leave empty to use default log format - accessLogFormat: "" - - # Set accessLogEncoding to JSON or TEXT to configure sidecar access log - accessLogEncoding: 'TEXT' - - enableEnvoyAccessLogService: false - mixerCheckServer: istio-policy.istio-system.svc.cluster.local:15004 - mixerReportServer: istio-telemetry.istio-system.svc.cluster.local:15004 - # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached. - # Default is false which means the traffic is denied when the client is unable to connect to Mixer. - policyCheckFailOpen: false - # Let Pilot give ingresses the public IP of the Istio ingressgateway - ingressService: istio-ingressgateway - - # Default connect timeout for dynamic clusters generated by Pilot and returned via XDS - connectTimeout: 10s - - # Automatic protocol detection uses a set of heuristics to - # determine whether the connection is using TLS or not (on the - # server side), as well as the application protocol being used - # (e.g., http vs tcp). These heuristics rely on the client sending - # the first bits of data. For server first protocols like MySQL, - # MongoDB, etc., Envoy will timeout on the protocol detection after - # the specified period, defaulting to non mTLS plain TCP - # traffic. Set this field to tweak the period that Envoy will wait - # for the client to send the first bits of data. (MUST BE >=1ms) - protocolDetectionTimeout: 100ms - - # DNS refresh rate for Envoy clusters of type STRICT_DNS - dnsRefreshRate: 300s - - # Unix Domain Socket through which envoy communicates with NodeAgent SDS to get - # key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - sdsUdsPath: "unix:/var/run/sds/uds_path" - - # The trust domain corresponds to the trust root of a system. - # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain - trustDomain: "" - - # Set the default behavior of the sidecar for handling outbound traffic from the application: - # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no - # services or ServiceEntries for the destination port - # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well - # as those defined through ServiceEntries - outboundTrafficPolicy: - mode: ALLOW_ANY - localityLbSetting: - enabled: true - # The namespace to treat as the administrative root namespace for istio - # configuration. - rootNamespace: istio-system - configSources: - - address: istio-galley.istio-system.svc:9901 - tlsSettings: - mode: ISTIO_MUTUAL - - defaultConfig: - # - # TCP connection timeout between Envoy & the application, and between Envoys. Used for static clusters - # defined in Envoy's configuration file - connectTimeout: 10s - # - ### ADVANCED SETTINGS ############# - # Where should envoy's configuration be stored in the istio-proxy container - configPath: "/etc/istio/proxy" - binaryPath: "/usr/local/bin/envoy" - # The pseudo service name used for Envoy. - serviceCluster: istio-proxy - # These settings that determine how long an old Envoy - # process should be kept alive after an occasional reload. - drainDuration: 45s - parentShutdownDuration: 1m0s - # - # The mode used to redirect inbound connections to Envoy. This setting - # has no effect on outbound traffic: iptables REDIRECT is always used for - # outbound connections. - # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. - # The "REDIRECT" mode loses source addresses during redirection. - # If "TPROXY", use iptables TPROXY to redirect to Envoy. - # The "TPROXY" mode preserves both the source and destination IP - # addresses and ports, so that they can be used for advanced filtering - # and manipulation. - # The "TPROXY" mode also configures the sidecar to run with the - # CAP_NET_ADMIN capability, which is required to use TPROXY. - #interceptionMode: REDIRECT - # - # Port where Envoy listens (on local host) for admin commands - # You can exec into the istio-proxy container in a pod and - # curl the admin port (curl http://localhost:15000/) to obtain - # diagnostic information from Envoy. See - # https://lyft.github.io/envoy/docs/operations/admin.html - # for more details - proxyAdminPort: 15000 - # - # Set concurrency to a specific number to control the number of Proxy worker threads. - # If set to 0 (default), then start worker thread for each CPU thread/core. - concurrency: 2 - # - tracing: - zipkin: - # Address of the Zipkin collector - address: zipkin.istio-system:9411 - # - # Mutual TLS authentication between sidecars and istio control plane. - controlPlaneAuthPolicy: MUTUAL_TLS - # - # Address where istio Pilot service is running - discoveryAddress: istio-pilot.istio-system:15011 - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index bab14b0984..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,276 +0,0 @@ -apiVersion: v1 -data: - prometheus.yaml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - name: prometheus - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index f394e916f9..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 852fd9feff..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index ea2d39ca12..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index a590dc8ab9..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - type: NodePort diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 7f7aac66b2..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 92eddb06cd..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 2013882d45..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - name: https-inject - port: 443 - - name: http-monitoring - port: 15014 - selector: - istio: sidecar-injector diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index b02397a061..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index 147fda3aac..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index bfd1afc2a9..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index a1fdfb36c4..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index 7d7230c868..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index 9630e83a84..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml deleted file mode 100644 index 74f7f7a736..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: nodeagent - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index 066bd7fa6e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index 26c77ce158..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index 3b225d382e..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 1cb719e1cd..0000000000 --- a/tests/stacks/azure/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system diff --git a/tests/stacks/azure/application/istio/kustomize_test.go b/tests/stacks/azure/application/istio/kustomize_test.go deleted file mode 100644 index 50d1f67310..0000000000 --- a/tests/stacks/azure/application/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/stacks/azure/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 9c7e471ebc..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "OFF" diff --git a/tests/stacks/azure/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml b/tests/stacks/azure/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml deleted file mode 100644 index ccc61b697b..0000000000 --- a/tests/stacks/azure/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "OFF" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-parameters-t6hhgfg9k2 - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/base/kustomize_test.go b/tests/stacks/azure/application/jupyter-web-app/base/kustomize_test.go deleted file mode 100644 index 9415d350f4..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package base - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/azure/application/jupyter-web-app/base", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 2583fa2263..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index 098ea28b6d..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/kustomize_test.go b/tests/stacks/azure/application/jupyter-web-app/kustomize_test.go deleted file mode 100644 index cd4f9af5c3..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package jupyter_web_app - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/jupyter-web-app", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 2583fa2263..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index df4b224d44..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.$(namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index 098ea28b6d..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/azure/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/application/oidc-authservice/kustomize_test.go b/tests/stacks/azure/application/oidc-authservice/kustomize_test.go deleted file mode 100644 index 65c7e3061c..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package oidc_authservice - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/oidc-authservice", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml deleted file mode 100644 index d9c3eddc26..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice - namespace: istio-system -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: PersistentVolumeClaim - - group: networking.istio.io - kind: EnvoyFilter - descriptor: - description: Provides OIDC-based authentication for Kubeflow Applications, at - the Istio Gateway. - keywords: - - oidc - - authservice - - authentication - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/oidc-authservice - - description: Docs - url: https://www.kubeflow.org/docs/started/k8s/kfctl-existing-arrikto - maintainers: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - owners: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - type: oidc-authservice - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/instance: oidc-authservice-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: oidc-authservice - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml deleted file mode 100644 index ef1dcd82a8..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - serviceName: authservice - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - spec: - containers: - - env: - - name: USERID_HEADER - value: kubeflow-userid - - name: USERID_PREFIX - value: "" - - name: USERID_CLAIM - value: email - - name: OIDC_PROVIDER - value: https://login.microsoftonline.com//v2.0 - - name: OIDC_AUTH_URL - value: https://login.microsoftonline.com//oauth2/v2.0/authorize - - name: OIDC_SCOPES - value: profile email groups - - name: REDIRECT_URL - value: https:///login/oidc - - name: SKIP_AUTH_URI - value: "" - - name: PORT - value: "8080" - - name: CLIENT_ID - value: - - name: CLIENT_SECRET - value: - - name: STORE_PATH - value: /var/lib/authservice/data.db - image: gcr.io/arrikto/kubeflow/oidc-authservice:28c59ef - imagePullPolicy: Always - name: authservice - ports: - - containerPort: 8080 - name: http-api - readinessProbe: - httpGet: - path: / - port: 8081 - volumeMounts: - - mountPath: /var/lib/authservice - name: data - securityContext: - fsGroup: 111 - volumes: - - name: data - persistentVolumeClaim: - claimName: authservice-pvc diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml deleted file mode 100644 index 510e1df10f..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authn-filter - namespace: istio-system -spec: - filters: - - filterConfig: - httpService: - authorizationRequest: - allowedHeaders: - patterns: - - exact: cookie - - exact: X-Auth-Token - authorizationResponse: - allowedUpstreamHeaders: - patterns: - - exact: kubeflow-userid - serverUri: - cluster: outbound|8080||authservice.istio-system.svc.cluster.local - failureModeAllow: false - timeout: 10s - uri: http://authservice.istio-system.svc.cluster.local - statusOnError: - code: GatewayTimeout - filterName: envoy.ext_authz - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - istio: ingressgateway diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml deleted file mode 100644 index 8cd96e5509..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -data: - application_secret: - client_id: - gatewaySelector: ingressgateway - namespace: istio-system - oidc_auth_url: https://login.microsoftonline.com//oauth2/v2.0/authorize - oidc_provider: https://login.microsoftonline.com//v2.0 - oidc_redirect_uri: https:///login/oidc - skip_auth_uri: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice-parameters - namespace: istio-system diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml deleted file mode 100644 index 7496a46ef8..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice-pvc - namespace: istio-system -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml b/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml deleted file mode 100644 index 0884d424a4..0000000000 --- a/tests/stacks/azure/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - ports: - - name: http-authservice - port: 8080 - targetPort: http-api - publishNotReadyAddresses: true - selector: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - type: ClusterIP diff --git a/tests/stacks/azure/application/spark-operator/kustomize_test.go b/tests/stacks/azure/application/spark-operator/kustomize_test.go deleted file mode 100644 index ccf0e5f005..0000000000 --- a/tests/stacks/azure/application/spark-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spark_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/spark-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index ddd151fa47..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2550 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: scheduledsparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: ScheduledSparkApplication - listKind: ScheduledSparkApplicationList - plural: scheduledsparkapplications - shortNames: - - scheduledsparkapp - singular: scheduledsparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - concurrencyPolicy: - type: string - failedRunHistoryLimit: - format: int32 - type: integer - schedule: - type: string - successfulRunHistoryLimit: - format: int32 - type: integer - suspend: - type: boolean - template: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - schedule - - template - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index bf9aacd2ff..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2532 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: sparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: SparkApplication - listKind: SparkApplicationList - plural: sparkapplications - shortNames: - - sparkapp - singular: sparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml deleted file mode 100644 index 47bbe36a1d..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - name: spark-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: SparkOperator - descriptor: - description: Spark-operator allows users to create and manage the "SparkApplication" - custom resource. - keywords: - - spark - maintainers: - - email: holden@pigscanfly.ca - name: Holden Karau - owners: - - email: holden@pigscanfly.ca - name: Holden Karau - type: spark-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: sppark-operator - app.kubernetes.io/instance: spark-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml deleted file mode 100644 index 8f9cf52035..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - strategy: - type: Recreate - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "10254" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - spec: - containers: - - args: - - -v=2 - - -namespace= - - -ingress-url-format= - - -controller-threads=10 - - -resync-interval=30 - - -logtostderr - - -enable-metrics=true - - -metrics-labels=app_type - - -metrics-port=10254 - - -metrics-endpoint=/metrics - - -metrics-prefix= - image: gcr.io/spark-operator/spark-operator:v1beta2-1.1.0-2.4.5 - imagePullPolicy: IfNotPresent - name: sparkoperator - ports: - - containerPort: 10254 - serviceAccountName: spark-operatoroperator-sa diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml deleted file mode 100644 index 8f7eabad51..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-cr -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - '*' -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - create - - get - - delete - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - create - - get - - delete -- apiGroups: - - "" - resources: - - nodes - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - create - - update - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get - - update - - delete -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - get - - update - - delete -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - - scheduledsparkapplications - - sparkapplications/status - - scheduledsparkapplications/status - verbs: - - '*' diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml deleted file mode 100644 index 7b3d77da27..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator-crb -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spark-operatoroperator-cr -subjects: -- kind: ServiceAccount - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml deleted file mode 100644 index e4a3af18c1..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml deleted file mode 100644 index ed9bb0d46e..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: spark-operatorspark-role -subjects: -- kind: ServiceAccount - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml deleted file mode 100644 index b089a63b4c..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml b/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml deleted file mode 100644 index eb83084001..0000000000 --- a/tests/stacks/azure/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/azure/application/spartakus/kustomize_test.go b/tests/stacks/azure/application/spartakus/kustomize_test.go deleted file mode 100644 index cbe454a2d4..0000000000 --- a/tests/stacks/azure/application/spartakus/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spartakus - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/azure/application/spartakus", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 531fe0dac7..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 6a4c558264..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index f2e0bb974d..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index 9cad7bb143..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index 8572b43906..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - usageId: -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index be719e7753..0000000000 --- a/tests/stacks/azure/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/azure/kustomize_test.go b/tests/stacks/azure/kustomize_test.go deleted file mode 100644 index 1f75e6849c..0000000000 --- a/tests/stacks/azure/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package azure - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/azure", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/metadata/kustomize_test.go b/tests/stacks/azure/metadata/kustomize_test.go deleted file mode 100644 index 8d38b86f84..0000000000 --- a/tests/stacks/azure/metadata/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package metadata - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../stacks/azure/metadata", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/azure/metadata/test_data/expected/default_apps_v1_deployment_deployment.yaml b/tests/stacks/azure/metadata/test_data/expected/default_apps_v1_deployment_deployment.yaml deleted file mode 100644 index 4c32f301e0..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/default_apps_v1_deployment_deployment.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: server - kustomize.component: metadata - name: deployment -spec: - replicas: 1 - selector: - matchLabels: - component: server - kustomize.component: metadata - template: - metadata: - labels: - component: server - kustomize.component: metadata - spec: - containers: - - command: - - ./server/server - - --http_port=8080 - - --mysql_service_host=$(MYSQL_HOST) - - --mlmd_db_name=$(MYSQL_DATABASE) - - --mysql_service_port=$(MYSQL_PORT) - - --mysql_service_user=$(MYSQL_USERNAME) - - --mysql_service_password=$(MYSQL_PASSWORD) - envFrom: - - configMapRef: - name: metadata-db-parameters-hc59m6d49g - - secretRef: - name: metadata-db-secrets-c9d6622b8k - name: container diff --git a/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_configmap_metadata-db-parameters-hc59m6d49g.yaml b/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_configmap_metadata-db-parameters-hc59m6d49g.yaml deleted file mode 100644 index 7b130a6fea..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_configmap_metadata-db-parameters-hc59m6d49g.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: mlmetadata - MYSQL_HOST: '[db_name].mysql.database.azure.com' - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters-hc59m6d49g diff --git a/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_secret_metadata-db-secrets-c9d6622b8k.yaml b/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_secret_metadata-db-secrets-c9d6622b8k.yaml deleted file mode 100644 index 4bca41cac0..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/default_~g_v1_secret_metadata-db-secrets-c9d6622b8k.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - MYSQL_PASSWORD: W2FkbWluX3Bhc3N3b3JkXQ== - MYSQL_USERNAME: W2FkbWluX3VzZXJfbmFtZV1AW2RiX25hbWVd -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets-c9d6622b8k -type: Opaque diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 9df90ec9c1..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=$(MYSQL_HOST) - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USERNAME) - - --mysql_config_password=$(MYSQL_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/azure/metadata/test_data/expected/kubeflow_~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index b8ca4aa4c9..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.defaulter - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-pods - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.pod-mutator - namespaceSelector: - matchExpressions: - - key: control-plane - operator: DoesNotExist - objectSelector: - matchExpressions: - - key: serving.kubeflow.org/inferenceservice - operator: Exists - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - pods diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml deleted file mode 100644 index 2079d17e31..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook.istio.networking.internal.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: istio-webhook - namespace: kubeflow - failurePolicy: Fail - name: webhook.istio.networking.internal.knative.dev - objectSelector: - matchExpressions: - - key: serving.knative.dev/configuration - operator: Exists - sideEffects: None diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml deleted file mode 100644 index 2c0f6c8e12..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: kubeflow - failurePolicy: Fail - name: webhook.serving.knative.dev - sideEffects: None diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml deleted file mode 100644 index c64e779719..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config.webhook.istio.networking.internal.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: istio-webhook - namespace: kubeflow - failurePolicy: Fail - name: config.webhook.istio.networking.internal.knative.dev - namespaceSelector: - matchExpressions: - - key: serving.knative.dev/release - operator: Exists - sideEffects: None diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml deleted file mode 100644 index 12d7c28ff5..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config.webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: kubeflow - failurePolicy: Fail - name: config.webhook.serving.knative.dev - namespaceSelector: - matchExpressions: - - key: serving.knative.dev/release - operator: Exists - sideEffects: None diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index f48d420c35..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /validate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.validator - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices diff --git a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml deleted file mode 100644 index 81d728e7f2..0000000000 --- a/tests/stacks/azure/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: validation.webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: kubeflow - failurePolicy: Fail - name: validation.webhook.serving.knative.dev - sideEffects: None diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml deleted file mode 100644 index f0661a3919..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: certificates.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: Certificate - plural: certificates - shortNames: - - kcert - singular: certificate - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml deleted file mode 100644 index 0687243b57..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/podspecable: "true" - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: configurations.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.latestCreatedRevisionName - name: LatestCreated - type: string - - JSONPath: .status.latestReadyRevisionName - name: LatestReady - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Configuration - plural: configurations - shortNames: - - config - - cfg - singular: configuration - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml deleted file mode 100644 index 54e2a31781..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - name: images.caching.internal.knative.dev -spec: - group: caching.internal.knative.dev - names: - categories: - - knative-internal - - caching - kind: Image - plural: images - shortNames: - - img - singular: image - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml deleted file mode 100644 index 92abef117b..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml +++ /dev/null @@ -1,3941 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - controller-gen.kubebuilder.io/version: v0.3.1-0.20200528125929-5c0c6ae3b64b - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservices.serving.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.traffic - name: Default Traffic - type: integer - - JSONPath: .status.canaryTraffic - name: Canary Traffic - type: integer - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: serving.kubeflow.org - names: - kind: InferenceService - listKind: InferenceServiceList - plural: inferenceservices - shortNames: - - inferenceservice - singular: inferenceservice - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - canary: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - canaryTrafficPercent: - type: integer - default: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - required: - - default - type: object - status: - properties: - address: - properties: - url: - type: string - type: object - canary: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - canaryTraffic: - type: integer - conditions: - items: - properties: - lastTransitionTime: - type: string - message: - type: string - reason: - type: string - severity: - type: string - status: - type: string - type: - type: string - required: - - status - - type - type: object - type: array - default: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - observedGeneration: - format: int64 - type: integer - traffic: - type: integer - url: - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml deleted file mode 100644 index aac61a6241..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: ingresses.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: Ingress - plural: ingresses - shortNames: - - kingress - - king - singular: ingress - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml deleted file mode 100644 index 2e71fdbfcd..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: metrics.autoscaling.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: autoscaling.internal.knative.dev - names: - categories: - - knative-internal - - autoscaling - kind: Metric - plural: metrics - singular: metric - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml deleted file mode 100644 index f59db66ec0..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml +++ /dev/null @@ -1,156 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpijobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MPIJob - plural: mpijobs - shortNames: - - mj - - mpij - singular: mpijob - scope: Namespaced - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - properties: - spec: - description: Only one of gpus, processingUnits, or replicas should be - specified - oneOf: - - properties: - gpus: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of GPUs - gpusPerNode: - description: Defaults to the number of GPUs per worker - minimum: 1 - title: The maximum number of GPUs available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - gpus - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - processingUnits: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of processing units - processingUnitsPerNode: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The maximum number of processing units available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - processingUnits - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - replicas: - description: The processing resource limit should be specified for - each replica - minimum: 1 - title: Total number of replicas - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - replicas - title: The MPIJob spec - served: false - storage: false - - name: v1alpha2 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: false - - name: v1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml deleted file mode 100644 index cdb2b4d628..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxjobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MXJob - plural: mxjobs - singular: mxjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - mxReplicaSpecs: - properties: - Scheduler: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Server: - properties: - replicas: - minimum: 1 - type: integer - Tuner: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - TunerServer: - properties: - replicas: - minimum: 1 - type: integer - TunerTracker: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - version: v1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml deleted file mode 100644 index 0c81858ede..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: podautoscalers.autoscaling.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.desiredScale - name: DesiredScale - type: integer - - JSONPath: .status.actualScale - name: ActualScale - type: integer - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: autoscaling.internal.knative.dev - names: - categories: - - knative-internal - - autoscaling - kind: PodAutoscaler - plural: podautoscalers - shortNames: - - kpa - - pa - singular: podautoscaler - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml deleted file mode 100644 index 232e16809a..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: revisions.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .metadata.labels['serving\.knative\.dev/configuration'] - name: Config Name - type: string - - JSONPath: .status.serviceName - name: K8s Service Name - type: string - - JSONPath: .metadata.labels['serving\.knative\.dev/configurationGeneration'] - name: Generation - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Revision - plural: revisions - shortNames: - - rev - singular: revision - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml deleted file mode 100644 index 4d5e1ac389..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/addressable: "true" - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: routes.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Route - plural: routes - shortNames: - - rt - singular: route - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index ddd151fa47..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2550 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: scheduledsparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: ScheduledSparkApplication - listKind: ScheduledSparkApplicationList - plural: scheduledsparkapplications - shortNames: - - scheduledsparkapp - singular: scheduledsparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - concurrencyPolicy: - type: string - failedRunHistoryLimit: - format: int32 - type: integer - schedule: - type: string - successfulRunHistoryLimit: - format: int32 - type: integer - suspend: - type: boolean - template: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - schedule - - template - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml deleted file mode 100644 index b86858ef53..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: serverlessservices.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .spec.mode - name: Mode - type: string - - JSONPath: .spec.numActivators - name: Activators - type: integer - - JSONPath: .status.serviceName - name: ServiceName - type: string - - JSONPath: .status.privateServiceName - name: PrivateServiceName - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: ServerlessService - plural: serverlessservices - shortNames: - - sks - singular: serverlessservice - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml deleted file mode 100644 index c9b0403ad2..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml +++ /dev/null @@ -1,65 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/addressable: "true" - duck.knative.dev/podspecable: "true" - knative.dev/crd-install: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: services.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.latestCreatedRevisionName - name: LatestCreated - type: string - - JSONPath: .status.latestReadyRevisionName - name: LatestReady - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Service - plural: services - shortNames: - - kservice - - ksvc - singular: service - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index bf9aacd2ff..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2532 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: sparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: SparkApplication - listKind: SparkApplicationList - plural: sparkapplications - shortNames: - - sparkapp - singular: sparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/azure/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml deleted file mode 100644 index ede8bec645..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: Secret - - group: core - kind: ConfigMap - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - descriptor: - description: KFServing provides a Kubernetes Custom Resource Definition for serving - ML Models on arbitrary frameworks - keywords: - - kfserving - - inference - links: - - description: About - url: https://github.com/kubeflow/kfserving - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: kfserving - version: v0.4.1 - selector: - matchLabels: - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml deleted file mode 100644 index aae5ccc8d6..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: knative-serving-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-serving-crds - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-serving-crds - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml deleted file mode 100644 index 2a834ceed9..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: knative-serving-install - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-serving-install - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-serving-install - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADMAAAAyCAYAAADx/eOPAAALuUlEQVRogd2afWxd9XnHP99bK4pS3yhiGUIRiiJUVVVqbq8ppdR20ibqpuIMtDRkUYERp29J57gMZVuxsrZiK7oZXVv5re1AiOuoG+N1DMkuytprsGPEVMouxqQZJVHEWIdQlGVxZlmZdb/747zcc869jpMO+seOdPz7nd/L83tev89zzjX8Bq795Rq9o17zXp+Tey+Ijkyboela29DRWkhffyT733pH/Z3este9F2cC6N0kNjxtjD+FdRD8UF9X7u97y7UbQFPAivC0BdllS381slun3s3z3xVhhqeds90tqR/oMB7u68z19ZZra0E/l1if3WOziPx3skrDPTr+bvDxfxImEIJbgX6gGBJ7EfHJX/ySReDHwO9KYAenyWCMFKw21GSeslwa2Z17+TcuzPBRr7B8m6Df5oOJqdPAR/u6cm/2lmv3At+IT3GiXZqbcaxSLsfRoTsvn7XL2jE87ZXGnwf+VGiDY86ETM1wU1+XjvSW/RlgTJADQ2QaCZKWcX1/aDIcjE8i3SdzZLjn0lm8pJXD02417BM+gLmq2Rqjr/d16Vu95dp6wc8Ra5O8NrPIcoZCvIR1H+KZkd2qLcfnRYUZOuorJO+3uQt0RerolGYZR7r5+C9ZATwPviGyQprd6Liszy3bnwVKwGMjPbnFyxJmeNpX2T4gaR/QmmSpyYZTho/2depMb9k/kNh3KawuJ1bWauHzUcyXRpZAv5Zmg7aHBLcmNN9ECAFeAO3s69KZ3nLtDuF9dnBs0IT9JO24rbPb0JfP2syCZpFfE5q1mRWcvlgMNcwMTRq9z/+OWXdx4AGjvX1deqC37DbwPwOrMgsufol5mWMWs1ivEbjTrOCtLNNb+udygqsNbUBtopR/NkuuwTJ6Hxsw67KSuvH5MPDA/nJttfGTdUFCMUlp/ALwOtIs9muBxpnFnBzuSQf21oP/BbXclVvumWuTaDN8WNBm2GizJkxPM0CDMA2WGZ72bbb/Njue2TRj9Il/PcG87SeBz4ZTNaSTsmctHcO8SqDp14d7dCFLZ2v/3OpQ023Ah4n65kohvETUCdcsfmuilD+bpNdgGZvOODuHqYGIVGCec9g7+7o031v2jaBTiD0ysxbHRnZrPktzyz1zK7f0z10nh5pWwLRhvZro1KqznVJhNB8UyDeSsU4zAOiIXV1OuEqQ2AR79nflXgcY6dGLwIvR8q39cy1b+uc2Emo6dI824BpMSxz8iVhy4m/2WiYHdV5UmOHp2mpwm52ESCdwRn+9v0tPAWzpn9sAFAQbMdc60PaHsFZEWd9uxk4z8G3seykECfObTEd2KmuZG4CWyLXkYLMwtiYt+hMsTUdAEZQzjs9apv66SHJRk73ZjBQ+iRu29s+1VEr5OImmXs4MHUahVoLWgK23wbv6OrU4OulcuHYehWsVHhpXwpE2FNRayTszX2cwDpQEzTB+QvrJHCXUaigk+c++aXZiE98YmUVgV19X7u3ypH/fgfUA5h2usY2jNjmWoGVn50nvC9T2NviA5OPBGPW91OlG+0Xa1WJhhqadk3WjpKCilQIQFP19XZocnfIHgIeFWyNh6goXyX6gdNWfU8aJ5tNjEheAHZVS/ruGj0s8k6VPhh6ms6kwgoLl1aGuCEuSpwXfHZ2qrTJ+HHkNCpOjmbdFcEcGUIhUSj/H65rPO6j+766U8i/QXV0z8cqJc4btwF8AtWgtMb1wj+j41Df/s1EYQwdEDiqM3hDes9quGY3IKoYOvCrU7HlCoZtEWapPkzEpsU8uq8b36a6uBqaBv5l45URLpZT/pmGH8LnkvlAdAOt1oeXqRsuYTjlEMJiXvWN/Z+5szfqioKcOKo7qr/nAEesKiOyv2A/q88rOx8+8bPhK5dUTAA8jbUT6MuKnbKteNVHKP23xCeD1LC0F2TWOmzoAKEiWxmC+sr8rN1OerF2HGaqXFcZhDWaYj11S4ZxcXxVqyKqPZOeNTwM7Jkr5BeDPQJ8NFQaoC/gZ26rXT5TyxxAfRx6P94d0gU0pYYama+tsbwix/AHM4fKUrwAeB68kRJ5AZsWWieGTjLipsVCgrKCwKHF7pZQ/RXf104j76i4ZMmquxkzRXb2zUsqfxdxsfCiA70hRjZbpCDHmJcRdeZPDHkVck0Ul5PeHZ81DgHxKtglXaHCxVN9fr5TyR9hW3QA8Amqp5526SyKtBEbZVv1eZeZkbqKU7xfsFJwPqRW29s+11oUxnUhnkHf2dWoB+R5Jv5dNaGHh1wog8d/ZAI+0GgVpFPTp4AfJT2Hup7u6EvMk0tpkboutEz0HMPzHyD+mu3pFpZR/Aug0Pgm0RLkvFzLWYfjDvs7cqfKUt2LuXTLhue5mdWhVDJdEzxDDcRKawceN9lRePVkDfgBcR/LKVqNpz/s08DO6q4VKKT8j8zHgJ1HyzA1P11YZjfV1arw85auBR4RalDB5lEjDKi0CgPPphKZ0QiNRwUQeg88B2ydKreew9yH1NCxe/r4GaZpt1Vsrh/JnDDcBLwPkbLVgf6s86RXYj4KvtJKJM8KsGLkSlsmUL6mSg1RJY1xD7KmU8sfprnYgBqJsGVsiEfupsca7FfMo26p/OfHKiVqllB8HyPV16VxfV66G/G1QBwY5xvCgTT7X3/MTaBbFVr0fJvqw2ASZ+yul/FN0V68CHsesiDl3UopM3CwhDZDD/Dnwj3S/sjoYAMqTtc1YX02jVqYOiuuqsAKIkqZCfFIz/IrfFY8gDrKt2gI8irSuwQezyTeNaOl+6qYb+fpYGKEXJE9GSTObK5ItrheaLHE5/XRKcHul+kYN8x2kzWlLNNuVtUqibzKW5CBjxUoszO7NWrS1E/xWvMeJjck2WQHEKJeMD+qH4gWCSvg00m3AVxv5TMRKsp9Cs0Q/Ka/1BOZQNBSXMz2b9Q5oO9JCKgkqg2aKofl8uvTPeE1w3t5KKf8y26pFxINhLRa5R9JV6huT/aZuFu7Ds+A9jBdj+VIvZz2b9BL2Xi5yJQEgUFqinI9SZBDx358o5Q/HiRGtquOEmxJu6DcbC/afQWxnvHg+Odrwm2bP5txh5OEYjOM3vaiu8qqHJw1mPmK/Xs7HJf0LRncDMF5cAL6NWUxDrX/duwbczljxjSzvTX+gtXU3MBlrRCltrsxBTgorACKrRGf5bczOiVLrhUL74B2F9oHVjBd/iLwTWEhr+CIWaLYumDjIWLHha+aSwvRs1iJmJ9Kb9ZJRETS3ACsMC8i1ZNwgXZDYWTmU/1WhfeAW8Cjo+UL7wDrGik8jfid0kYz/Z2ODepv+GPIY+FAznpcUJhAo9w5mh81CFtEsWieCTzwXkogmfKBSyh8ttA98EDPqoPouYqYLxYEPMVY8itmEeTM+KEaqZhVAkiPPIL6QDPhLFiYQSC9J7M3mGlF/24zWSvwIM1xoH2gF/sFiTcSPxQakqUJxsIPx4jGCr0AzCUYTbROJ7DPAdsbSAX9ZwgDs3qTDiMGUOxF/1DgfekLVsPf0sw8DPARsDNwy8iYBXov4p0L7wC2MF99CfBJ4rqmbJbO/qYE+x1jx5HK8Xtp/aFgHDM/FX+RM9FFjHjjj4NV3HvlPsP4g+SqQgm6zCuvJQnHgi4wVz2JuAj8RnLGEVaCf8Y8cuRQ2L0mYEBB2Gb8ZHKD4NQBx+0Qpf7LQPrAVVGqiiWTpCcEn4QcLxcF7C7+aXMDahT1YX5IS5DHE/ZfC4yULEwr0DtIOWwuuvwZ8rVLKP1soDqzHPGJoyRao9b4SXiQQ30A8eO1/PJ8D7gK+BtQSJcQM8AXGlg747LUkmi91lad8J3CuZ5OeBii0D64ET2FdH1N0omWJvgLPkvwM8LmZf7lrnm3VO4CHsM4DH2P8I8vGSfK67P9q8v9wWPAcQLH4PbBHbK6Pq+3M9+Ml+6FL2dyC+WmhOLiWseKPMDeDd12uIPBrWCZ5Xds++AHsAwGlBKnoB5747c2J+aSJEuvRL8CDv/2Zz+cqh/LL/gPD//vrfwFjcI5oX6jDBwAAAABJRU5ErkJggg== - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml deleted file mode 100644 index 1ccc57b61d..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MPIJob - descriptor: - description: Mpi-operator allows users to create and manage the "MPIJob" custom - resource. - keywords: - - mpijob - - mpi-operator - links: - - description: About - url: https://github.com/kubeflow/mpi-operator - maintainers: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: stp.abhi@gmail.com - name: Abhilash Pallerlamudi - owners: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - type: mpi-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/instance: mpi-operator - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mpi-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml deleted file mode 100644 index 328aafbc81..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MXJob - descriptor: - description: mxnet-operator allows users to create and manage the "MXJob" custom - resource. - keywords: - - MXjob - - mxnet-operator - - mxnet-training - links: - - description: About - url: https://github.com/kubeflow/mxnet-operator - maintainers: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - owners: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - type: mxnet-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/instance: mxnet-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mxnet-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml deleted file mode 100644 index 47bbe36a1d..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - name: spark-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: SparkOperator - descriptor: - description: Spark-operator allows users to create and manage the "SparkApplication" - custom resource. - keywords: - - spark - maintainers: - - email: holden@pigscanfly.ca - name: Holden Karau - owners: - - email: holden@pigscanfly.ca - name: Holden Karau - type: spark-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: sppark-operator - app.kubernetes.io/instance: spark-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 531fe0dac7..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/azure/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_activator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_activator.yaml deleted file mode 100644 index 6fe7c865f1..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_activator.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator - namespace: kubeflow -spec: - selector: - matchLabels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: activator - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: activator - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: GOGC - value: "500" - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: POD_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/internal/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/activator@sha256:ffa3d72ee6c2eeb2357999248191a643405288061b7080381f22875cb703e929 - livenessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: activator - port: 8012 - name: activator - ports: - - containerPort: 8012 - name: http1 - - containerPort: 8013 - name: h2c - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - readinessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: activator - port: 8012 - resources: - limits: - cpu: 1000m - memory: 600Mi - requests: - cpu: 300m - memory: 60Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller - terminationGracePeriodSeconds: 300 diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_autoscaler.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_autoscaler.yaml deleted file mode 100644 index 82d4fbfa51..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_autoscaler.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: autoscaler - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - args: - - --secure-port=8443 - - --cert-dir=/tmp - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/autoscaler@sha256:f89fd23889c3e0ca3d8e42c9b189dc2f93aa5b3a91c64e8aab75e952a210eeb3 - livenessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: autoscaler - port: 8080 - name: autoscaler - ports: - - containerPort: 8080 - name: websocket - - containerPort: 9090 - name: metrics - - containerPort: 8443 - name: custom-metrics - - containerPort: 8008 - name: profiling - readinessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: autoscaler - port: 8080 - resources: - limits: - cpu: 300m - memory: 400Mi - requests: - cpu: 30m - memory: 40Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 71f6f46961..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_controller.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_controller.yaml deleted file mode 100644 index e66bb4dc38..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_controller.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: kubeflow -spec: - selector: - matchLabels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" - labels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/internal/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/controller@sha256:b86ac8ecc6b2688a0e0b9cb68298220a752125d0a048b8edf2cf42403224393c - name: controller - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - limits: - cpu: 1000m - memory: 1000Mi - requests: - cpu: 100m - memory: 100Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_istio-webhook.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_istio-webhook.yaml deleted file mode 100644 index cd480284f7..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_istio-webhook.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: istio-webhook - namespace: kubeflow -spec: - selector: - matchLabels: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/net-istio - - name: WEBHOOK_NAME - value: istio-webhook - image: gcr.io/knative-releases/knative.dev/net-istio/cmd/webhook@sha256:e6b142c0f82e0e0b8cb670c11eb4eef6ded827f98761bbf4bea7bdb777b80092 - name: webhook - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - - containerPort: 8443 - name: https-webhook - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 20m - memory: 20Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index ff7d0f4db5..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 77004306de..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 3d8cd5347c..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d395adaed4..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1a60f06ce5..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 1fb43d9089..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mpi-operator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_mpi-operator.yaml deleted file mode 100644 index 0c1efb4e29..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mpi-operator.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - spec: - containers: - - args: - - -alsologtostderr - - --lock-namespace - - kubeflow - - --kubectl-delivery-image - - mpioperator/kubectl-delivery:latest - image: mpioperator/mpi-operator:latest - imagePullPolicy: Always - name: mpi-operator - serviceAccountName: mpi-operator diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mxnet-operator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_mxnet-operator.yaml deleted file mode 100644 index a0724c00d7..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mxnet-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - spec: - containers: - - command: - - /opt/kubeflow/mxnet-operator.v1 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: kubeflow/mxnet-operator:v1.0.0-20200625 - imagePullPolicy: Always - name: mxnet-operator - serviceAccountName: mxnet-operator diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_networking-istio.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_networking-istio.yaml deleted file mode 100644 index 601316d71e..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_networking-istio.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: networking-istio - namespace: kubeflow -spec: - selector: - matchLabels: - app: networking-istio - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" - sidecar.istio.io/inject: "false" - labels: - app: networking-istio - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/net-istio - image: gcr.io/knative-releases/knative.dev/net-istio/cmd/controller@sha256:75c7918ca887622e7242ec1965f87036db1dc462464810b72735a8e64111f6f7 - name: networking-istio - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - limits: - cpu: 300m - memory: 400Mi - requests: - cpu: 30m - memory: 40Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 39da41fc12..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml deleted file mode 100644 index 8f9cf52035..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - strategy: - type: Recreate - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "10254" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - spec: - containers: - - args: - - -v=2 - - -namespace= - - -ingress-url-format= - - -controller-threads=10 - - -resync-interval=30 - - -logtostderr - - -enable-metrics=true - - -metrics-labels=app_type - - -metrics-port=10254 - - -metrics-endpoint=/metrics - - -metrics-prefix= - image: gcr.io/spark-operator/spark-operator:v1beta2-1.1.0-2.4.5 - imagePullPolicy: IfNotPresent - name: sparkoperator - ports: - - containerPort: 10254 - serviceAccountName: spark-operatoroperator-sa diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 6a4c558264..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_webhook.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_webhook.yaml deleted file mode 100644 index e8124bc1c6..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_webhook.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook - namespace: kubeflow -spec: - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/webhook@sha256:7e6df0fda229a13219bbc90ff72a10434a0c64cd7fe13dc534b914247d1087f4 - name: webhook - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - - containerPort: 8443 - name: https-webhook - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 20m - memory: 20Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/stacks/azure/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/azure/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/azure/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml b/tests/stacks/azure/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml deleted file mode 100644 index a2c14fbdd6..0000000000 --- a/tests/stacks/azure/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager - namespace: kubeflow -spec: - selector: - matchLabels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - serviceName: controller-manager-service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - spec: - containers: - - args: - - --secure-listen-address=0.0.0.0:8443 - - --upstream=http://127.0.0.1:8080/ - - --logtostderr=true - - --v=10 - image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 - name: kube-rbac-proxy - ports: - - containerPort: 8443 - name: https - - args: - - --metrics-addr=127.0.0.1:8080 - command: - - /manager - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SECRET_NAME - value: kfserving-webhook-server-cert - image: gcr.io/kfserving/kfserving-controller:v0.4.1 - imagePullPolicy: Always - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - resources: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/azure/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml b/tests/stacks/azure/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml deleted file mode 100644 index e59e9fbf68..0000000000 --- a/tests/stacks/azure/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator - namespace: kubeflow -spec: - maxReplicas: 20 - metrics: - - resource: - name: cpu - targetAverageUtilization: 100 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: activator diff --git a/tests/stacks/azure/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml b/tests/stacks/azure/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml deleted file mode 100644 index a872046984..0000000000 --- a/tests/stacks/azure/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: caching.internal.knative.dev/v1alpha1 -kind: Image -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: queue-proxy - namespace: kubeflow -spec: - image: gcr.io/knative-releases/knative.dev/serving/cmd/queue@sha256:d066ae5b642885827506610ae25728d442ce11447b82df6e9cc4c174bb97ecb3 diff --git a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml b/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml deleted file mode 100644 index 2bee492dde..0000000000 --- a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: serving-cert - namespace: kubeflow -spec: - commonName: kfserving-webhook-server-service.kubeflow.svc - dnsNames: - - kfserving-webhook-server-service.kubeflow.svc - issuerRef: - kind: Issuer - name: selfsigned-issuer - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml b/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml deleted file mode 100644 index 66e2c6a096..0000000000 --- a/tests/stacks/azure/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/azure/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml b/tests/stacks/azure/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml deleted file mode 100644 index d80509f7d0..0000000000 --- a/tests/stacks/azure/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: anonymous - namespace: kubeflow -spec: - owner: - kind: User - name: anonymous diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml deleted file mode 100644 index dadc42db87..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: cluster-local-gateway - namespace: kubeflow -spec: - selector: - istio: cluster-local-gateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index 0a002320c4..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/azure/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml deleted file mode 100644 index 20101b5c10..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml +++ /dev/null @@ -1,169 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.knative.dev - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - - inferenceservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml deleted file mode 100644 index 3224dc4cac..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-role -rules: -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml deleted file mode 100644 index e59f35d5f4..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/addressable: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-addressable-resolver -rules: -- apiGroups: - - serving.knative.dev - resources: - - routes - - routes/status - - services - - services/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml deleted file mode 100644 index defbbc5955..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - serving.knative.dev/controller: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml deleted file mode 100644 index 522c106ceb..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml +++ /dev/null @@ -1,128 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/controller: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-core -rules: -- apiGroups: - - "" - resources: - - pods - - namespaces - - secrets - - configmaps - - endpoints - - services - - events - - serviceaccounts - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - "" - resources: - - endpoints/restricted - verbs: - - create -- apiGroups: - - apps - resources: - - deployments - - deployments/finalizers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - - customresourcedefinitions/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - serving.knative.dev - - autoscaling.internal.knative.dev - - networking.internal.knative.dev - resources: - - '*' - - '*/status' - - '*/finalizers' - verbs: - - get - - list - - create - - update - - delete - - deletecollection - - patch - - watch -- apiGroups: - - caching.internal.knative.dev - resources: - - images - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml deleted file mode 100644 index 81fd9a6fbc..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/controller: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-istio -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - gateways - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml deleted file mode 100644 index 1b1d7787c0..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-admin -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml deleted file mode 100644 index 78264a1553..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-edit: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-edit -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - create - - update - - patch - - delete diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml deleted file mode 100644 index 0bad4a4ced..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-view: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-view -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml deleted file mode 100644 index f1de7a3fdc..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/podspecable: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-podspecable-binding -rules: -- apiGroups: - - serving.knative.dev - resources: - - configurations - - services - verbs: - - list - - watch - - patch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml deleted file mode 100644 index 4012a5d635..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kfserving-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml deleted file mode 100644 index a26a3d786d..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" - name: kubeflow-kfserving-edit -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml deleted file mode 100644 index 6882fb5538..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kfserving-view -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml deleted file mode 100644 index 8afc1cd608..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mpijobs-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml deleted file mode 100644 index 598c7c7b7b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" - name: kubeflow-mpijobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml deleted file mode 100644 index b3ef136d77..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mpijobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml deleted file mode 100644 index 7292a7b4b9..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mxjobs-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml deleted file mode 100644 index a6778579cd..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" - name: kubeflow-mxjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml deleted file mode 100644 index 8abdd41f86..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mxjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml deleted file mode 100644 index 9ef4b587b5..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml +++ /dev/null @@ -1,107 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - verbs: - - create - - list - - watch -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - pods/exec - verbs: - - create -- apiGroups: - - "" - resources: - - endpoints - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - create - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - list - - update - - watch -- apiGroups: - - apps - resources: - - statefulsets - verbs: - - create - - list - - update - - watch -- apiGroups: - - batch - resources: - - jobs - verbs: - - create - - list - - update - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/finalizers - - mpijobs/status - verbs: - - '*' -- apiGroups: - - scheduling.incubator.k8s.io - - scheduling.sigs.dev - resources: - - queues - - podgroups - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml deleted file mode 100644 index 8f7eabad51..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-cr -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - '*' -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - create - - get - - delete - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - create - - get - - delete -- apiGroups: - - "" - resources: - - nodes - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - create - - update - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get - - update - - delete -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - get - - update - - delete -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - - scheduledsparkapplications - - sparkapplications/status - - scheduledsparkapplications/status - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml deleted file mode 100644 index 8f8a8e11d5..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-manager-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml deleted file mode 100644 index 11a2758d7f..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-proxy-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml deleted file mode 100644 index 156d95cf1a..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-controller-admin -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-serving-admin -subjects: -- kind: ServiceAccount - name: controller - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml deleted file mode 100644 index 5ceb1390e6..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mpi-operator -subjects: -- kind: ServiceAccount - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml deleted file mode 100644 index 7b3d77da27..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator-crb -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spark-operatoroperator-cr -subjects: -- kind: ServiceAccount - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml deleted file mode 100644 index 7cd6bb7453..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml deleted file mode 100644 index e4a3af18c1..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml deleted file mode 100644 index f4c229a984..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: leader-election-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml deleted file mode 100644 index ed9bb0d46e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: spark-operatorspark-role -subjects: -- kind: ServiceAccount - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml deleted file mode 100644 index 0008889d3b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - - pods - - services - - endpoints - - persistentvolumeclaims - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index f2e0bb974d..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml deleted file mode 100644 index 09c59a95a9..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mxnet-operator -subjects: -- kind: ServiceAccount - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index 9cad7bb143..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml b/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml deleted file mode 100644 index 5731f32aff..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: istio-service-role - namespace: kubeflow -spec: - rules: - - methods: - - '*' - services: - - '*' diff --git a/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml b/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml deleted file mode 100644 index 121f5e891b..0000000000 --- a/tests/stacks/azure/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: istio-service-role-binding - namespace: kubeflow -spec: - roleRef: - kind: ServiceRole - name: istio-service-role - subjects: - - user: '*' diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index 1fec89e08f..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Kubeflow Overview", - "desc": "An overview of Kubeflow architecture and workflows", - "link": "https://www.kubeflow.org/docs/started/kubeflow-overview/" - }, - { - "text": "Kubeflow on Azure", - "desc": "Running Kubeflow on AKS and Microsoft Azure", - "link": "https://www.kubeflow.org/docs/azure/" - }, - { - "text": "Azure Machine Learning Docs", - "desc": "Azure Machine Learning Documentation", - "link": "https://aka.ms/kubeflow-azureml-docs" - }, - { - "text": "Azure Kubernetes Service Docs", - "desc": "Azure Kubernetes Service Documentation", - "link": "https://aka.ms/kubeflow-aks-docs" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-autoscaler.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-autoscaler.yaml deleted file mode 100644 index 443d1d829c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-autoscaler.yaml +++ /dev/null @@ -1,149 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # The Revision ContainerConcurrency field specifies the maximum number - # of requests the Container can handle at once. Container concurrency - # target percentage is how much of that maximum to use in a stable - # state. E.g. if a Revision specifies ContainerConcurrency of 10, then - # the Autoscaler will try to maintain 7 concurrent connections per pod - # on average. - # Note: this limit will be applied to container concurrency set at every - # level (ConfigMap, Revision Spec or Annotation). - # For legacy and backwards compatibility reasons, this value also accepts - # fractional values in (0, 1] interval (i.e. 0.7 ⇒ 70%). - # Thus minimal percentage value must be greater than 1.0, or it will be - # treated as a fraction. - # NOTE: that this value does not affect actual number of concurrent requests - # the user container may receive, but only the average number of requests - # that the revision pods will receive. - container-concurrency-target-percentage: "70" - - # The container concurrency target default is what the Autoscaler will - # try to maintain when concurrency is used as the scaling metric for the - # Revision and the Revision specifies unlimited concurrency. - # When revision explicitly specifies container concurrency, that value - # will be used as a scaling target for autoscaler. - # When specifying unlimited concurrency, the autoscaler will - # horizontally scale the application based on this target concurrency. - # This is what we call "soft limit" in the documentation, i.e. it only - # affects number of pods and does not affect the number of requests - # individual pod processes. - # The value must be a positive number such that the value multiplied - # by container-concurrency-target-percentage is greater than 0.01. - # NOTE: that this value will be adjusted by application of - # container-concurrency-target-percentage, i.e. by default - # the system will target on average 70 concurrent requests - # per revision pod. - # NOTE: Only one metric can be used for autoscaling a Revision. - container-concurrency-target-default: "100" - - # The requests per second (RPS) target default is what the Autoscaler will - # try to maintain when RPS is used as the scaling metric for a Revision and - # the Revision specifies unlimited RPS. Even when specifying unlimited RPS, - # the autoscaler will horizontally scale the application based on this - # target RPS. - # Must be greater than 1.0. - # NOTE: Only one metric can be used for autoscaling a Revision. - requests-per-second-target-default: "200" - - # The target burst capacity specifies the size of burst in concurrent - # requests that the system operator expects the system will receive. - # Autoscaler will try to protect the system from queueing by introducing - # Activator in the request path if the current spare capacity of the - # service is less than this setting. - # If this setting is 0, then Activator will be in the request path only - # when the revision is scaled to 0. - # If this setting is > 0 and container-concurrency-target-percentage is - # 100% or 1.0, then activator will always be in the request path. - # -1 denotes unlimited target-burst-capacity and activator will always - # be in the request path. - # Other negative values are invalid. - target-burst-capacity: "200" - - # When operating in a stable mode, the autoscaler operates on the - # average concurrency over the stable window. - # Stable window must be in whole seconds. - stable-window: "60s" - - # When observed average concurrency during the panic window reaches - # panic-threshold-percentage the target concurrency, the autoscaler - # enters panic mode. When operating in panic mode, the autoscaler - # scales on the average concurrency over the panic window which is - # panic-window-percentage of the stable-window. - # When computing the panic window it will be rounded to the closest - # whole second. - panic-window-percentage: "10.0" - - # The percentage of the container concurrency target at which to - # enter panic mode when reached within the panic window. - panic-threshold-percentage: "200.0" - - # Max scale up rate limits the rate at which the autoscaler will - # increase pod count. It is the maximum ratio of desired pods versus - # observed pods. - # Cannot be less or equal to 1. - # I.e with value of 2.0 the number of pods can at most go N to 2N - # over single Autoscaler period (see tick-interval), but at least N to - # N+1, if Autoscaler needs to scale up. - max-scale-up-rate: "1000.0" - - # Max scale down rate limits the rate at which the autoscaler will - # decrease pod count. It is the maximum ratio of observed pods versus - # desired pods. - # Cannot be less or equal to 1. - # I.e. with value of 2.0 the number of pods can at most go N to N/2 - # over single Autoscaler evaluation period (see tick-interval), but at - # least N to N-1, if Autoscaler needs to scale down. - max-scale-down-rate: "2.0" - - # Scale to zero feature flag - enable-scale-to-zero: "true" - - # Tick interval is the time between autoscaling calculations. - tick-interval: "2s" - - # Scale to zero grace period is the time an inactive revision is left - # running before it is scaled to zero (min: 6s). - scale-to-zero-grace-period: "30s" - - # Enable graceful scaledown feature flag. - # Once enabled, it allows the autoscaler to prioritize pods processing - # fewer (or zero) requests for removal when scaling down. - enable-graceful-scaledown: "false" - - # pod-autoscaler-class specifies the default pod autoscaler class - # that should be used if none is specified. If omitted, the Knative - # Horizontal Pod Autoscaler (KPA) is used by default. - pod-autoscaler-class: "kpa.autoscaling.knative.dev" - - # The capacity of a single activator task. - # The `unit` is one concurrent request proxied by the activator. - # activator-capacity must be at least 1. - # This value is used for computation of the Activator subset size. - # See the algorithm here: http://bit.ly/38XiCZ3. - # TODO(vagababov): tune after actual benchmarking. - activator-capacity: "100.0" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-autoscaler - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-defaults.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-defaults.yaml deleted file mode 100644 index a865e2f8b4..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-defaults.yaml +++ /dev/null @@ -1,81 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # revision-timeout-seconds contains the default number of - # seconds to use for the revision's per-request timeout, if - # none is specified. - revision-timeout-seconds: "300" # 5 minutes - - # max-revision-timeout-seconds contains the maximum number of - # seconds that can be used for revision-timeout-seconds. - # This value must be greater than or equal to revision-timeout-seconds. - # If omitted, the system default is used (600 seconds). - max-revision-timeout-seconds: "600" # 10 minutes - - # revision-cpu-request contains the cpu allocation to assign - # to revisions by default. If omitted, no value is specified - # and the system default is used. - revision-cpu-request: "400m" # 0.4 of a CPU (aka 400 milli-CPU) - - # revision-memory-request contains the memory allocation to assign - # to revisions by default. If omitted, no value is specified - # and the system default is used. - revision-memory-request: "100M" # 100 megabytes of memory - - # revision-cpu-limit contains the cpu allocation to limit - # revisions to by default. If omitted, no value is specified - # and the system default is used. - revision-cpu-limit: "1000m" # 1 CPU (aka 1000 milli-CPU) - - # revision-memory-limit contains the memory allocation to limit - # revisions to by default. If omitted, no value is specified - # and the system default is used. - revision-memory-limit: "200M" # 200 megabytes of memory - - # container-name-template contains a template for the default - # container name, if none is specified. This field supports - # Go templating and is supplied with the ObjectMeta of the - # enclosing Service or Configuration, so values such as - # {{.Name}} are also valid. - container-name-template: "user-container" - - # container-concurrency specifies the maximum number - # of requests the Container can handle at once, and requests - # above this threshold are queued. Setting a value of zero - # disables this throttling and lets through as many requests as - # the pod receives. - container-concurrency: "0" - - # The container concurrency max limit is an operator setting ensuring that - # the individual revisions cannot have arbitrary large concurrency - # values, or autoscaling targets. `container-concurrency` default setting - # must be at or below this value. - # Must be greater than 1. - container-concurrency-max-limit: "1000" - - # feature flag indicates whether to enable multi container support or not - enable-multi-container: "false" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-defaults - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-deployment.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-deployment.yaml deleted file mode 100644 index 7e186133d2..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # List of repositories for which tag to digest resolving should be skipped - registriesSkippingTagResolving: "ko.local,dev.local" - queueSidecarImage: gcr.io/knative-releases/knative.dev/serving/cmd/queue@sha256:d066ae5b642885827506610ae25728d442ce11447b82df6e9cc4c174bb97ecb3 -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-deployment - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-domain.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-domain.yaml deleted file mode 100644 index 5a04c51771..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-domain.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Default value for domain. - # Although it will match all routes, it is the least-specific rule so it - # will only be used if no other domain matches. - example.com: | - - # These are example settings of domain. - # example.org will be used for routes having app=nonprofit. - example.org: | - selector: - app: nonprofit - - # Routes having domain suffix of 'svc.cluster.local' will not be exposed - # through Ingress. You can define your own label selector to assign that - # domain suffix to your Route here, or you can set the label - # "serving.knative.dev/visibility=cluster-local" - # to achieve the same effect. This shows how to make routes having - # the label app=secret only exposed to the local cluster. - svc.cluster.local: | - selector: - app: secret -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-domain - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-gc.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-gc.yaml deleted file mode 100644 index dcf4c52cb2..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-gc.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Delay after revision creation before considering it for GC - stale-revision-create-delay: "48h" - - # Duration since a route has pointed at the revision before it - # should be GC'd. - # This minus lastpinned-debounce must be longer than the controller - # resync period (10 hours). - stale-revision-timeout: "15h" - - # Minimum number of generations of revisions to keep before considering - # them for GC - stale-revision-minimum-generations: "20" - - # To avoid constant updates, we allow an existing annotation to be stale by this - # amount before we update the timestamp. - stale-revision-lastpinned-debounce: "5h" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-gc - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-istio.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-istio.yaml deleted file mode 100644 index 502c36a68c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-istio.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Default Knative Gateway after v0.3. It points to the Istio - # standard istio-ingressgateway, instead of a custom one that we - # used pre-0.3. The configuration format should be `gateway. - # {{gateway_namespace}}.{{gateway_name}}: "{{ingress_name}}. - # {{ingress_namespace}}.svc.cluster.local"`. The {{gateway_namespace}} - # is optional; when it is omitted, the system will search for - # the gateway in the serving system namespace `knative-serving` - gateway.knative-serving.knative-ingress-gateway: "istio-ingressgateway.istio-system.svc.cluster.local" - - # A cluster local gateway to allow pods outside of the mesh to access - # Services and Routes not exposing through an ingress. If the users - # do have a service mesh setup, this isn't required and can be removed. - # - # An example use case is when users want to use Istio without any - # sidecar injection (like Knative's istio-ci-no-mesh.yaml). Since every pod - # is outside of the service mesh in that case, a cluster-local service - # will need to be exposed to a cluster-local gateway to be accessible. - # The configuration format should be `local-gateway.{{local_gateway_namespace}}. - # {{local_gateway_name}}: "{{cluster_local_gateway_name}}. - # {{cluster_local_gateway_namespace}}.svc.cluster.local"`. The - # {{local_gateway_namespace}} is optional; when it is omitted, the system - # will search for the local gateway in the serving system namespace - # `knative-serving` - local-gateway.knative-serving.cluster-local-gateway: "cluster-local-gateway.istio-system.svc.cluster.local" - - # To use only Istio service mesh and no cluster-local-gateway, replace - # all local-gateway.* entries by the following entry. - local-gateway.mesh: "mesh" - gateway.kubeflow.kubeflow-gateway: istio-ingressgateway.istio-system.svc.cluster.local - local-gateway.knative-serving.cluster-local-gateway: cluster-local-gateway.istio-system.svc.cluster.local - local-gateway.mesh: mesh -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: config-istio - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-leader-election.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-leader-election.yaml deleted file mode 100644 index ab36d097ff..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-leader-election.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # resourceLock controls which API resource is used as the basis for the - # leader election lock. Valid values are: - # - # - leases -> use the coordination API - # - configmaps -> use configmaps - # - endpoints -> use endpoints - resourceLock: "leases" - - # leaseDuration is how long non-leaders will wait to try to acquire the - # lock; 15 seconds is the value used by core kubernetes controllers. - leaseDuration: "15s" - # renewDeadline is how long a leader will try to renew the lease before - # giving up; 10 seconds is the value used by core kubernetes controllers. - renewDeadline: "10s" - # retryPeriod is how long the leader election client waits between tries of - # actions; 2 seconds is the value used by core kubernetes controllers. - retryPeriod: "2s" - # enabledComponents is a comma-delimited list of component names for which - # leader election is enabled. Valid values are: - # - # - controller - # - hpaautoscaler - # - certcontroller - # - istiocontroller - # - nscontroller - enabledComponents: "controller,hpaautoscaler,certcontroller,istiocontroller,nscontroller" - leaseDuration: 15s - renewDeadline: 10s - resourceLock: leases - retryPeriod: 2s -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-leader-election - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-logging.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-logging.yaml deleted file mode 100644 index b68fdab10f..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-logging.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Common configuration for all Knative codebase - zap-logger-config: | - { - "level": "info", - "development": false, - "outputPaths": ["stdout"], - "errorOutputPaths": ["stderr"], - "encoding": "json", - "encoderConfig": { - "timeKey": "ts", - "levelKey": "level", - "nameKey": "logger", - "callerKey": "caller", - "messageKey": "msg", - "stacktraceKey": "stacktrace", - "lineEnding": "", - "levelEncoder": "", - "timeEncoder": "iso8601", - "durationEncoder": "", - "callerEncoder": "" - } - } - - # Log level overrides - # For all components except the autoscaler and queue proxy, - # changes are be picked up immediately. - # For autoscaler and queue proxy, changes require recreation of the pods. - loglevel.controller: "info" - loglevel.autoscaler: "info" - loglevel.queueproxy: "info" - loglevel.webhook: "info" - loglevel.activator: "info" - loglevel.hpaautoscaler: "info" - loglevel.certcontroller: "info" - loglevel.istiocontroller: "info" - loglevel.nscontroller: "info" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-logging - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-network.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-network.yaml deleted file mode 100644 index 2411ce6678..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-network.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # DEPRECATED: - # istio.sidecar.includeOutboundIPRanges is obsolete. - # The current versions have outbound network access enabled by default. - # If you need this option for some reason, please use global.proxy.includeIPRanges in Istio. - # - # istio.sidecar.includeOutboundIPRanges: "*" - - # ingress.class specifies the default ingress class - # to use when not dictated by Route annotation. - # - # If not specified, will use the Istio ingress. - # - # Note that changing the Ingress class of an existing Route - # will result in undefined behavior. Therefore it is best to only - # update this value during the setup of Knative, to avoid getting - # undefined behavior. - ingress.class: "istio.ingress.networking.knative.dev" - - # certificate.class specifies the default Certificate class - # to use when not dictated by Route annotation. - # - # If not specified, will use the Cert-Manager Certificate. - # - # Note that changing the Certificate class of an existing Route - # will result in undefined behavior. Therefore it is best to only - # update this value during the setup of Knative, to avoid getting - # undefined behavior. - certificate.class: "cert-manager.certificate.networking.knative.dev" - - # domainTemplate specifies the golang text template string to use - # when constructing the Knative service's DNS name. The default - # value is "{{.Name}}.{{.Namespace}}.{{.Domain}}". And those three - # values (Name, Namespace, Domain) are the only variables defined. - # - # Changing this value might be necessary when the extra levels in - # the domain name generated is problematic for wildcard certificates - # that only support a single level of domain name added to the - # certificate's domain. In those cases you might consider using a value - # of "{{.Name}}-{{.Namespace}}.{{.Domain}}", or removing the Namespace - # entirely from the template. When choosing a new value be thoughtful - # of the potential for conflicts - for example, when users choose to use - # characters such as `-` in their service, or namespace, names. - # {{.Annotations}} can be used for any customization in the go template if needed. - # We strongly recommend keeping namespace part of the template to avoid domain name clashes - # Example '{{.Name}}-{{.Namespace}}.{{ index .Annotations "sub"}}.{{.Domain}}' - # and you have an annotation {"sub":"foo"}, then the generated template would be {Name}-{Namespace}.foo.{Domain} - domainTemplate: "{{.Name}}.{{.Namespace}}.{{.Domain}}" - - # tagTemplate specifies the golang text template string to use - # when constructing the DNS name for "tags" within the traffic blocks - # of Routes and Configuration. This is used in conjunction with the - # domainTemplate above to determine the full URL for the tag. - tagTemplate: "{{.Tag}}-{{.Name}}" - - # Controls whether TLS certificates are automatically provisioned and - # installed in the Knative ingress to terminate external TLS connection. - # 1. Enabled: enabling auto-TLS feature. - # 2. Disabled: disabling auto-TLS feature. - autoTLS: "Disabled" - - # Controls the behavior of the HTTP endpoint for the Knative ingress. - # It requires autoTLS to be enabled. - # 1. Enabled: The Knative ingress will be able to serve HTTP connection. - # 2. Disabled: The Knative ingress will reject HTTP traffic. - # 3. Redirected: The Knative ingress will send a 302 redirect for all - # http connections, asking the clients to use HTTPS - httpProtocol: "Enabled" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-network - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-observability.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-observability.yaml deleted file mode 100644 index 55b6f77662..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-observability.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ # # # EXAMPLE CONFIGURATION # # # ################################ - - # This block is not actually functional configuration, # but serves to illustrate the available configuration # options and document them in a way that is accessible # to users that `kubectl edit` this config map. # - # These sample configuration options may be copied out of # this example block and unindented to be in the data block # to actually change the configuration. - # logging.enable-var-log-collection defaults to false. # The fluentd daemon set will be set up to collect /var/log if # this flag is true. logging.enable-var-log-collection: "false" - # logging.revision-url-template provides a template to use for producing the # logging URL that is injected into the status of each Revision. # This value is what you might use the the Knative monitoring bundle, and provides # access to Kibana after setting up kubectl proxy. logging.revision-url-template: | - http://localhost:8001/api/v1/namespaces/knative-monitoring/services/kibana-logging/proxy/app/kibana#/discover?_a=(query:(match:(kubernetes.labels.serving-knative-dev%2FrevisionUID:(query:'${REVISION_UID}',type:phrase)))) - - # If non-empty, this enables queue proxy writing user request logs to stdout, excluding probe # requests. # The value determines the shape of the request logs and it must be a valid go text/template. # It is important to keep this as a single line. Multiple lines are parsed as separate entities # by most collection agents and will split the request logs into multiple records. # # The following fields and functions are available to the template: # # Request: An http.Request (see https://golang.org/pkg/net/http/#Request) # representing an HTTP request received by the server. # # Response: # struct { # Code int // HTTP status code (see https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml) # Size int // An int representing the size of the response. # Latency float64 // A float64 representing the latency of the response in seconds. # } # # Revision: # struct { # Name string // Knative revision name # Namespace string // Knative revision namespace # Service string // Knative service name # Configuration string // Knative configuration name # PodName string // Name of the pod hosting the revision # PodIP string // IP of the pod hosting the revision # } # logging.request-log-template: '{"httpRequest": {"requestMethod": "{{.Request.Method}}", "requestUrl": "{{js .Request.RequestURI}}", "requestSize": "{{.Request.ContentLength}}", "status": {{.Response.Code}}, "responseSize": "{{.Response.Size}}", "userAgent": "{{js .Request.UserAgent}}", "remoteIp": "{{js .Request.RemoteAddr}}", "serverIp": "{{.Revision.PodIP}}", "referer": "{{js .Request.Referer}}", "latency": "{{.Response.Latency}}s", "protocol": "{{.Request.Proto}}"}, "traceId": "{{index .Request.Header "X-B3-Traceid"}}"}' - # If true, this enables queue proxy writing request logs for probe requests to stdout. # It uses the same template for user requests, i.e. logging.request-log-template. logging.enable-probe-request-log: "false" - # metrics.backend-destination field specifies the system metrics destination. # It supports either prometheus (the default) or stackdriver. # Note: Using stackdriver will incur additional charges metrics.backend-destination: prometheus - # metrics.request-metrics-backend-destination specifies the request metrics # destination. It enables queue proxy to send request metrics. # Currently supported values: prometheus (the default), stackdriver. metrics.request-metrics-backend-destination: prometheus - # metrics.stackdriver-project-id field specifies the stackdriver project ID. This # field is optional. When running on GCE, application default credentials will be # used if this field is not provided. metrics.stackdriver-project-id: "" - # metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to # Stackdriver using "global" resource type and custom metric type if the # metrics are not supported by "knative_revision" resource type. Setting this # flag to "true" could cause extra Stackdriver charge. # If metrics.backend-destination is not Stackdriver, this is ignored. metrics.allow-stackdriver-custom-metrics: "false" - # profiling.enable indicates whether it is allowed to retrieve runtime profiling data from # the pods via an HTTP server in the format expected by the pprof visualization tool. When # enabled, the Knative Serving pods expose the profiling data on an alternate HTTP port 8008. # The HTTP context root for profiling is then /debug/pprof/. profiling.enable: "false" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-observability - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-tracing.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-tracing.yaml deleted file mode 100644 index 350f75a663..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_config-tracing.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - # - # This may be "zipkin" or "stackdriver", the default is "none" - backend: "none" - - # URL to zipkin collector where traces are sent. - # This must be specified when backend is "zipkin" - zipkin-endpoint: "http://zipkin.istio-system.svc.cluster.local:9411/api/v2/spans" - - # The GCP project into which stackdriver metrics will be written - # when backend is "stackdriver". If unspecified, the project-id - # is read from GCP metadata when running on GCP. - stackdriver-project-id: "my-project" - - # Enable zipkin debug mode. This allows all spans to be sent to the server - # bypassing sampling. - debug: "false" - - # Percentage (0-1) of requests to trace - sample-rate: "0.1" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-tracing - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml deleted file mode 100644 index 0af9fe8d4b..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - profile-name: anonymous - user: anonymous -kind: ConfigMap -metadata: - name: default-install-config-h877hbtmf7 - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml deleted file mode 100644 index 3dde29f148..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: v1 -data: - batcher: |- - { - "image" : "kfserving/batcher:v0.4.0", - "memoryRequest": "1Gi", - "memoryLimit": "1Gi", - "cpuRequest": "1", - "cpuLimit": "1" - } - credentials: |- - { - "gcs": { - "gcsCredentialFileName": "gcloud-application-credentials.json" - }, - "s3": { - "s3AccessKeyIDName": "AWS_ACCESS_KEY_ID", - "s3SecretAccessKeyName": "AWS_SECRET_ACCESS_KEY" - } - } - explainers: |- - { - "alibi": { - "image" : "gcr.io/kfserving/alibi-explainer", - "defaultImageVersion": "v0.4.1" - } - } - ingress: |- - { - "ingressGateway" : "kubeflow-gateway.kubeflow", - "ingressService" : "istio-ingressgateway.istio-system.svc.cluster.local" - } - logger: |- - { - "image" : "gcr.io/kfserving/logger:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1", - "defaultUrl": "http://default-broker" - } - predictors: |- - { - "tensorflow": { - "image": "tensorflow/serving", - "defaultImageVersion": "1.14.0", - "defaultGpuImageVersion": "1.14.0-gpu" - }, - "onnx": { - "image": "mcr.microsoft.com/onnxruntime/server", - "defaultImageVersion": "v1.0.0" - }, - "sklearn": { - "image": "gcr.io/kfserving/sklearnserver", - "defaultImageVersion": "v0.4.1" - }, - "xgboost": { - "image": "gcr.io/kfserving/xgbserver", - "defaultImageVersion": "v0.4.1" - }, - "pytorch": { - "image": "gcr.io/kfserving/pytorchserver", - "defaultImageVersion": "v0.4.1", - "defaultGpuImageVersion": "v0.4.1-gpu" - }, - "triton": { - "image": "nvcr.io/nvidia/tritonserver", - "defaultImageVersion": "20.03-py3" - } - } - storageInitializer: |- - { - "image" : "gcr.io/kfserving/storage-initializer:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1" - } - transformers: |- - { - } -kind: ConfigMap -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml deleted file mode 100644 index ff54ae481a..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - kubectl-delivery-image: mpioperator/kubectl-delivery:latest - lock-namespace: kubeflow -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index 8572b43906..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - usageId: -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 025357f80b..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: pns, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index a3eff61112..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: pns - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_namespace_knative-serving.yaml b/tests/stacks/azure/test_data/expected/~g_v1_namespace_knative-serving.yaml deleted file mode 100644 index 8f1eb03c76..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_namespace_knative-serving.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving diff --git a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml deleted file mode 100644 index 8c9537adbc..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: istio-webhook-certs - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml deleted file mode 100644 index 63dd5ee927..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-secret - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/azure/test_data/expected/~g_v1_secret_webhook-certs.yaml b/tests/stacks/azure/test_data/expected/~g_v1_secret_webhook-certs.yaml deleted file mode 100644 index 9a9bfb7678..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_secret_webhook-certs.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook-certs - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_activator-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_activator-service.yaml deleted file mode 100644 index c82eee08ed..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_activator-service.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - targetPort: 8012 - - name: http2 - port: 81 - targetPort: 8013 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - selector: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_autoscaler.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_autoscaler.yaml deleted file mode 100644 index 55c5359f16..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_autoscaler.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: autoscaler - namespace: kubeflow -spec: - ports: - - name: http - port: 8080 - targetPort: 8080 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: https-custom-metrics - port: 443 - targetPort: 8443 - selector: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index b66a91c282..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.kubeflow - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_controller.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_controller.yaml deleted file mode 100644 index ccf93895d0..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_controller.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: kubeflow -spec: - ports: - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - selector: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_istio-webhook.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_istio-webhook.yaml deleted file mode 100644 index 8b9016b807..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_istio-webhook.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - serving.knative.dev/release: v0.14.3 - name: istio-webhook - namespace: kubeflow -spec: - ports: - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: https-webhook - port: 443 - targetPort: 8443 - selector: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index f70426fc0f..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.kubeflow - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml deleted file mode 100644 index 2b1aa4879d..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8443" - prometheus.io/scheme: https - prometheus.io/scrape: "true" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-metrics-service - namespace: kubeflow -spec: - ports: - - name: https - port: 8443 - targetPort: https - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml deleted file mode 100644 index 4ecffcb0a5..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml deleted file mode 100644 index 045fcdcdb8..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 9443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - kustomize.component: kfserving diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/azure/test_data/expected/~g_v1_service_webhook.yaml b/tests/stacks/azure/test_data/expected/~g_v1_service_webhook.yaml deleted file mode 100644 index 2a93c2e713..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_service_webhook.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - serving.knative.dev/release: v0.14.3 - name: webhook - namespace: kubeflow -spec: - ports: - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: https-webhook - port: 443 - targetPort: 8443 - selector: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_controller.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_controller.yaml deleted file mode 100644 index b4f0482c8a..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_controller.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml deleted file mode 100644 index dbe19ff814..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml deleted file mode 100644 index 668c2e0f1d..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml deleted file mode 100644 index b089a63b4c..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml deleted file mode 100644 index eb83084001..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index be719e7753..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/azure/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/examples/alice/kustomize_test.go b/tests/stacks/examples/alice/kustomize_test.go deleted file mode 100644 index ce08630a3d..0000000000 --- a/tests/stacks/examples/alice/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package alice - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../stacks/examples/alice", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index b8ca4aa4c9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.defaulter - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-pods - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.pod-mutator - namespaceSelector: - matchExpressions: - - key: control-plane - operator: DoesNotExist - objectSelector: - matchExpressions: - - key: serving.kubeflow.org/inferenceservice - operator: Exists - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - pods diff --git a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index f48d420c35..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /validate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.validator - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml deleted file mode 100644 index 92abef117b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml +++ /dev/null @@ -1,3941 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - controller-gen.kubebuilder.io/version: v0.3.1-0.20200528125929-5c0c6ae3b64b - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservices.serving.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.traffic - name: Default Traffic - type: integer - - JSONPath: .status.canaryTraffic - name: Canary Traffic - type: integer - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: serving.kubeflow.org - names: - kind: InferenceService - listKind: InferenceServiceList - plural: inferenceservices - shortNames: - - inferenceservice - singular: inferenceservice - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - canary: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - canaryTrafficPercent: - type: integer - default: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - required: - - default - type: object - status: - properties: - address: - properties: - url: - type: string - type: object - canary: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - canaryTraffic: - type: integer - conditions: - items: - properties: - lastTransitionTime: - type: string - message: - type: string - reason: - type: string - severity: - type: string - status: - type: string - type: - type: string - required: - - status - - type - type: object - type: array - default: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - observedGeneration: - format: int64 - type: integer - traffic: - type: integer - url: - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml deleted file mode 100644 index ede8bec645..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: Secret - - group: core - kind: ConfigMap - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - descriptor: - description: KFServing provides a Kubernetes Custom Resource Definition for serving - ML Models on arbitrary frameworks - keywords: - - kfserving - - inference - links: - - description: About - url: https://github.com/kubeflow/kfserving - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: kfserving - version: v0.4.1 - selector: - matchLabels: - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADMAAAAyCAYAAADx/eOPAAALuUlEQVRogd2afWxd9XnHP99bK4pS3yhiGUIRiiJUVVVqbq8ppdR20ibqpuIMtDRkUYERp29J57gMZVuxsrZiK7oZXVv5re1AiOuoG+N1DMkuytprsGPEVMouxqQZJVHEWIdQlGVxZlmZdb/747zcc869jpMO+seOdPz7nd/L83tev89zzjX8Bq795Rq9o17zXp+Tey+Ijkyboela29DRWkhffyT733pH/Z3este9F2cC6N0kNjxtjD+FdRD8UF9X7u97y7UbQFPAivC0BdllS381slun3s3z3xVhhqeds90tqR/oMB7u68z19ZZra0E/l1if3WOziPx3skrDPTr+bvDxfxImEIJbgX6gGBJ7EfHJX/ySReDHwO9KYAenyWCMFKw21GSeslwa2Z17+TcuzPBRr7B8m6Df5oOJqdPAR/u6cm/2lmv3At+IT3GiXZqbcaxSLsfRoTsvn7XL2jE87ZXGnwf+VGiDY86ETM1wU1+XjvSW/RlgTJADQ2QaCZKWcX1/aDIcjE8i3SdzZLjn0lm8pJXD02417BM+gLmq2Rqjr/d16Vu95dp6wc8Ra5O8NrPIcoZCvIR1H+KZkd2qLcfnRYUZOuorJO+3uQt0RerolGYZR7r5+C9ZATwPviGyQprd6Liszy3bnwVKwGMjPbnFyxJmeNpX2T4gaR/QmmSpyYZTho/2depMb9k/kNh3KawuJ1bWauHzUcyXRpZAv5Zmg7aHBLcmNN9ECAFeAO3s69KZ3nLtDuF9dnBs0IT9JO24rbPb0JfP2syCZpFfE5q1mRWcvlgMNcwMTRq9z/+OWXdx4AGjvX1deqC37DbwPwOrMgsufol5mWMWs1ivEbjTrOCtLNNb+udygqsNbUBtopR/NkuuwTJ6Hxsw67KSuvH5MPDA/nJttfGTdUFCMUlp/ALwOtIs9muBxpnFnBzuSQf21oP/BbXclVvumWuTaDN8WNBm2GizJkxPM0CDMA2WGZ72bbb/Njue2TRj9Il/PcG87SeBz4ZTNaSTsmctHcO8SqDp14d7dCFLZ2v/3OpQ023Ah4n65kohvETUCdcsfmuilD+bpNdgGZvOODuHqYGIVGCec9g7+7o031v2jaBTiD0ysxbHRnZrPktzyz1zK7f0z10nh5pWwLRhvZro1KqznVJhNB8UyDeSsU4zAOiIXV1OuEqQ2AR79nflXgcY6dGLwIvR8q39cy1b+uc2Emo6dI824BpMSxz8iVhy4m/2WiYHdV5UmOHp2mpwm52ESCdwRn+9v0tPAWzpn9sAFAQbMdc60PaHsFZEWd9uxk4z8G3seykECfObTEd2KmuZG4CWyLXkYLMwtiYt+hMsTUdAEZQzjs9apv66SHJRk73ZjBQ+iRu29s+1VEr5OImmXs4MHUahVoLWgK23wbv6OrU4OulcuHYehWsVHhpXwpE2FNRayTszX2cwDpQEzTB+QvrJHCXUaigk+c++aXZiE98YmUVgV19X7u3ypH/fgfUA5h2usY2jNjmWoGVn50nvC9T2NviA5OPBGPW91OlG+0Xa1WJhhqadk3WjpKCilQIQFP19XZocnfIHgIeFWyNh6goXyX6gdNWfU8aJ5tNjEheAHZVS/ruGj0s8k6VPhh6ms6kwgoLl1aGuCEuSpwXfHZ2qrTJ+HHkNCpOjmbdFcEcGUIhUSj/H65rPO6j+766U8i/QXV0z8cqJc4btwF8AtWgtMb1wj+j41Df/s1EYQwdEDiqM3hDes9quGY3IKoYOvCrU7HlCoZtEWapPkzEpsU8uq8b36a6uBqaBv5l45URLpZT/pmGH8LnkvlAdAOt1oeXqRsuYTjlEMJiXvWN/Z+5szfqioKcOKo7qr/nAEesKiOyv2A/q88rOx8+8bPhK5dUTAA8jbUT6MuKnbKteNVHKP23xCeD1LC0F2TWOmzoAKEiWxmC+sr8rN1OerF2HGaqXFcZhDWaYj11S4ZxcXxVqyKqPZOeNTwM7Jkr5BeDPQJ8NFQaoC/gZ26rXT5TyxxAfRx6P94d0gU0pYYama+tsbwix/AHM4fKUrwAeB68kRJ5AZsWWieGTjLipsVCgrKCwKHF7pZQ/RXf104j76i4ZMmquxkzRXb2zUsqfxdxsfCiA70hRjZbpCDHmJcRdeZPDHkVck0Ul5PeHZ81DgHxKtglXaHCxVN9fr5TyR9hW3QA8Amqp5526SyKtBEbZVv1eZeZkbqKU7xfsFJwPqRW29s+11oUxnUhnkHf2dWoB+R5Jv5dNaGHh1wog8d/ZAI+0GgVpFPTp4AfJT2Hup7u6EvMk0tpkboutEz0HMPzHyD+mu3pFpZR/Aug0Pgm0RLkvFzLWYfjDvs7cqfKUt2LuXTLhue5mdWhVDJdEzxDDcRKawceN9lRePVkDfgBcR/LKVqNpz/s08DO6q4VKKT8j8zHgJ1HyzA1P11YZjfV1arw85auBR4RalDB5lEjDKi0CgPPphKZ0QiNRwUQeg88B2ydKreew9yH1NCxe/r4GaZpt1Vsrh/JnDDcBLwPkbLVgf6s86RXYj4KvtJKJM8KsGLkSlsmUL6mSg1RJY1xD7KmU8sfprnYgBqJsGVsiEfupsca7FfMo26p/OfHKiVqllB8HyPV16VxfV66G/G1QBwY5xvCgTT7X3/MTaBbFVr0fJvqw2ASZ+yul/FN0V68CHsesiDl3UopM3CwhDZDD/Dnwj3S/sjoYAMqTtc1YX02jVqYOiuuqsAKIkqZCfFIz/IrfFY8gDrKt2gI8irSuwQezyTeNaOl+6qYb+fpYGKEXJE9GSTObK5ItrheaLHE5/XRKcHul+kYN8x2kzWlLNNuVtUqibzKW5CBjxUoszO7NWrS1E/xWvMeJjck2WQHEKJeMD+qH4gWCSvg00m3AVxv5TMRKsp9Cs0Q/Ka/1BOZQNBSXMz2b9Q5oO9JCKgkqg2aKofl8uvTPeE1w3t5KKf8y26pFxINhLRa5R9JV6huT/aZuFu7Ds+A9jBdj+VIvZz2b9BL2Xi5yJQEgUFqinI9SZBDx358o5Q/HiRGtquOEmxJu6DcbC/afQWxnvHg+Odrwm2bP5txh5OEYjOM3vaiu8qqHJw1mPmK/Xs7HJf0LRncDMF5cAL6NWUxDrX/duwbczljxjSzvTX+gtXU3MBlrRCltrsxBTgorACKrRGf5bczOiVLrhUL74B2F9oHVjBd/iLwTWEhr+CIWaLYumDjIWLHha+aSwvRs1iJmJ9Kb9ZJRETS3ACsMC8i1ZNwgXZDYWTmU/1WhfeAW8Cjo+UL7wDrGik8jfid0kYz/Z2ODepv+GPIY+FAznpcUJhAo9w5mh81CFtEsWieCTzwXkogmfKBSyh8ttA98EDPqoPouYqYLxYEPMVY8itmEeTM+KEaqZhVAkiPPIL6QDPhLFiYQSC9J7M3mGlF/24zWSvwIM1xoH2gF/sFiTcSPxQakqUJxsIPx4jGCr0AzCUYTbROJ7DPAdsbSAX9ZwgDs3qTDiMGUOxF/1DgfekLVsPf0sw8DPARsDNwy8iYBXov4p0L7wC2MF99CfBJ4rqmbJbO/qYE+x1jx5HK8Xtp/aFgHDM/FX+RM9FFjHjjj4NV3HvlPsP4g+SqQgm6zCuvJQnHgi4wVz2JuAj8RnLGEVaCf8Y8cuRQ2L0mYEBB2Gb8ZHKD4NQBx+0Qpf7LQPrAVVGqiiWTpCcEn4QcLxcF7C7+aXMDahT1YX5IS5DHE/ZfC4yULEwr0DtIOWwuuvwZ8rVLKP1soDqzHPGJoyRao9b4SXiQQ30A8eO1/PJ8D7gK+BtQSJcQM8AXGlg747LUkmi91lad8J3CuZ5OeBii0D64ET2FdH1N0omWJvgLPkvwM8LmZf7lrnm3VO4CHsM4DH2P8I8vGSfK67P9q8v9wWPAcQLH4PbBHbK6Pq+3M9+Ml+6FL2dyC+WmhOLiWseKPMDeDd12uIPBrWCZ5Xds++AHsAwGlBKnoB5747c2J+aSJEuvRL8CDv/2Zz+cqh/LL/gPD//vrfwFjcI5oX6jDBwAAAABJRU5ErkJggg== - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index f9d48b9ffe..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 3313341c20..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-5cc2fchd2g - name: config-volume diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 0d5f87d7d8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index ab069ba98e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index dee1edcbd0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bmh8k74f52 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bmh8k74f52 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/examples/alice/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml b/tests/stacks/examples/alice/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml deleted file mode 100644 index a2c14fbdd6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager - namespace: kubeflow -spec: - selector: - matchLabels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - serviceName: controller-manager-service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - spec: - containers: - - args: - - --secure-listen-address=0.0.0.0:8443 - - --upstream=http://127.0.0.1:8080/ - - --logtostderr=true - - --v=10 - image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 - name: kube-rbac-proxy - ports: - - containerPort: 8443 - name: https - - args: - - --metrics-addr=127.0.0.1:8080 - command: - - /manager - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SECRET_NAME - value: kfserving-webhook-server-cert - image: gcr.io/kfserving/kfserving-controller:v0.4.1 - imagePullPolicy: Always - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - resources: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml b/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml deleted file mode 100644 index 2bee492dde..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: serving-cert - namespace: kubeflow -spec: - commonName: kfserving-webhook-server-service.kubeflow.svc - dnsNames: - - kfserving-webhook-server-service.kubeflow.svc - issuerRef: - kind: Issuer - name: selfsigned-issuer - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml b/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml deleted file mode 100644 index 66e2c6a096..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/examples/alice/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml b/tests/stacks/examples/alice/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml deleted file mode 100644 index d80509f7d0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: anonymous - namespace: kubeflow -spec: - owner: - kind: User - name: anonymous diff --git a/tests/stacks/examples/alice/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/examples/alice/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml deleted file mode 100644 index 20101b5c10..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml +++ /dev/null @@ -1,169 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.knative.dev - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - - inferenceservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml deleted file mode 100644 index 3224dc4cac..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-role -rules: -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml deleted file mode 100644 index 4012a5d635..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kfserving-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml deleted file mode 100644 index a26a3d786d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" - name: kubeflow-kfserving-edit -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml deleted file mode 100644 index 6882fb5538..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kfserving-view -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml deleted file mode 100644 index 8f8a8e11d5..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-manager-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml deleted file mode 100644 index 11a2758d7f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-proxy-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml deleted file mode 100644 index 7cd6bb7453..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml deleted file mode 100644 index f4c229a984..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: leader-election-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml deleted file mode 100644 index 0af9fe8d4b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - profile-name: anonymous - user: anonymous -kind: ConfigMap -metadata: - name: default-install-config-h877hbtmf7 - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml deleted file mode 100644 index 3dde29f148..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: v1 -data: - batcher: |- - { - "image" : "kfserving/batcher:v0.4.0", - "memoryRequest": "1Gi", - "memoryLimit": "1Gi", - "cpuRequest": "1", - "cpuLimit": "1" - } - credentials: |- - { - "gcs": { - "gcsCredentialFileName": "gcloud-application-credentials.json" - }, - "s3": { - "s3AccessKeyIDName": "AWS_ACCESS_KEY_ID", - "s3SecretAccessKeyName": "AWS_SECRET_ACCESS_KEY" - } - } - explainers: |- - { - "alibi": { - "image" : "gcr.io/kfserving/alibi-explainer", - "defaultImageVersion": "v0.4.1" - } - } - ingress: |- - { - "ingressGateway" : "kubeflow-gateway.kubeflow", - "ingressService" : "istio-ingressgateway.istio-system.svc.cluster.local" - } - logger: |- - { - "image" : "gcr.io/kfserving/logger:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1", - "defaultUrl": "http://default-broker" - } - predictors: |- - { - "tensorflow": { - "image": "tensorflow/serving", - "defaultImageVersion": "1.14.0", - "defaultGpuImageVersion": "1.14.0-gpu" - }, - "onnx": { - "image": "mcr.microsoft.com/onnxruntime/server", - "defaultImageVersion": "v1.0.0" - }, - "sklearn": { - "image": "gcr.io/kfserving/sklearnserver", - "defaultImageVersion": "v0.4.1" - }, - "xgboost": { - "image": "gcr.io/kfserving/xgbserver", - "defaultImageVersion": "v0.4.1" - }, - "pytorch": { - "image": "gcr.io/kfserving/pytorchserver", - "defaultImageVersion": "v0.4.1", - "defaultGpuImageVersion": "v0.4.1-gpu" - }, - "triton": { - "image": "nvcr.io/nvidia/tritonserver", - "defaultImageVersion": "20.03-py3" - } - } - storageInitializer: |- - { - "image" : "gcr.io/kfserving/storage-initializer:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1" - } - transformers: |- - { - } -kind: ConfigMap -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice-config - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-5cc2fchd2g.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-5cc2fchd2g.yaml deleted file mode 100644 index 6936f83dd8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-5cc2fchd2g.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # This is a custom spawnerUiConfig. - # - # It looks like the entire file is replaced; so the user would need to supply a complete - # spawner config. - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: alicerepo/tensorflow-1.14.0-notebook-cpu:v-base-ef41372-1177829795472347138 - # The list of available standard container Images - options: - - alicerepo/tensorflow-1.15.2-notebook-cpu:1.0.0 - - alicerepo/tensorflow-1.15.2-notebook-gpu:1.0.0 - - alicerepo//tensorflow-2.1.0-notebook-cpu:1.0.0 - - alicerepo//tensorflow-2.1.0-notebook-gpu:1.0.0 -kind: ConfigMap -metadata: - annotations: {} - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-5cc2fchd2g - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-config-bmh8k74f52.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-config-bmh8k74f52.yaml deleted file mode 100644 index 189f5b444b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-config-bmh8k74f52.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - project: alice-gcp - userid-header: x-goog-authenticated-user-email - userid-prefix: 'accounts.google.com:' - zone: us-east1-d -kind: ConfigMap -metadata: - name: kubeflow-config-bmh8k74f52 - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml deleted file mode 100644 index 9963e3b53c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPd: dls-kf-storage-artifact-store - minioPvName: minio-pv -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-install-config-c42bb75m6g - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml deleted file mode 100644 index 4c8915b459..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPd: dls-kf-storage-metadata-store - mysqlPvName: mysql-pv -kind: ConfigMap -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-install-config-24c6km7cgg - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9d9b1dcd68..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 0f695c21ce..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml deleted file mode 100644 index 993f221972..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolume -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv -spec: - accessModes: - - ReadWriteOnce - capacity: - storage: 20Gi - gcePersistentDisk: - fsType: ext4 - pdName: dls-kf-storage-artifact-store diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml deleted file mode 100644 index 17f07cff7b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: PersistentVolume -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv -spec: - accessModes: - - ReadWriteOnce - capacity: - storage: 20Gi - gcePersistentDisk: - fsType: ext4 - pdName: dls-kf-storage-metadata-store diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 66356a42ba..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi - storageClassName: "" - volumeName: minio-pv diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index f239b247a9..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi - storageClassName: "" - volumeName: mysql-pv diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml deleted file mode 100644 index 63dd5ee927..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-secret - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml deleted file mode 100644 index 2b1aa4879d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8443" - prometheus.io/scheme: https - prometheus.io/scrape: "true" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-metrics-service - namespace: kubeflow -spec: - ports: - - name: https - port: 8443 - targetPort: https - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml deleted file mode 100644 index 4ecffcb0a5..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml deleted file mode 100644 index 045fcdcdb8..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 9443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - kustomize.component: kfserving diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index ec6dbe5668..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index ce91ca7be0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index fc5c8f073c..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 0e2bd62a2d..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-admin@project-id.iam.gserviceaccount.com - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/examples/alice/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/gcp/kustomize_test.go b/tests/stacks/gcp/kustomize_test.go deleted file mode 100644 index 22dd3bdc2f..0000000000 --- a/tests/stacks/gcp/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package gcp - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/gcp", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index b8ca4aa4c9..0000000000 --- a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.defaulter - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-pods - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.pod-mutator - namespaceSelector: - matchExpressions: - - key: control-plane - operator: DoesNotExist - objectSelector: - matchExpressions: - - key: serving.kubeflow.org/inferenceservice - operator: Exists - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - pods diff --git a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index f48d420c35..0000000000 --- a/tests/stacks/gcp/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /validate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.validator - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml deleted file mode 100644 index 92abef117b..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml +++ /dev/null @@ -1,3941 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - controller-gen.kubebuilder.io/version: v0.3.1-0.20200528125929-5c0c6ae3b64b - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservices.serving.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.traffic - name: Default Traffic - type: integer - - JSONPath: .status.canaryTraffic - name: Canary Traffic - type: integer - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: serving.kubeflow.org - names: - kind: InferenceService - listKind: InferenceServiceList - plural: inferenceservices - shortNames: - - inferenceservice - singular: inferenceservice - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - canary: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - canaryTrafficPercent: - type: integer - default: - properties: - explainer: - properties: - alibi: - properties: - config: - additionalProperties: - type: string - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - type: - type: string - required: - - type - type: object - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - predictor: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - onnx: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - parallelism: - type: integer - pytorch: - properties: - modelClassName: - type: string - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - serviceAccountName: - type: string - sklearn: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - tensorflow: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - triton: - properties: - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - xgboost: - properties: - nthread: - type: integer - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - runtimeVersion: - type: string - storageUri: - type: string - required: - - storageUri - type: object - type: object - transformer: - properties: - batcher: - properties: - maxBatchSize: - type: integer - maxLatency: - type: integer - timeout: - type: integer - type: object - custom: - properties: - container: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - windowsOptions: - properties: - gmsaCredentialSpec: - type: string - gmsaCredentialSpecName: - type: string - runAsUserName: - type: string - type: object - type: object - startupProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: integer - - type: string - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - subPathExpr: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - required: - - container - type: object - logger: - properties: - mode: - type: string - url: - type: string - type: object - maxReplicas: - type: integer - minReplicas: - type: integer - parallelism: - type: integer - serviceAccountName: - type: string - type: object - required: - - predictor - type: object - required: - - default - type: object - status: - properties: - address: - properties: - url: - type: string - type: object - canary: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - canaryTraffic: - type: integer - conditions: - items: - properties: - lastTransitionTime: - type: string - message: - type: string - reason: - type: string - severity: - type: string - status: - type: string - type: - type: string - required: - - status - - type - type: object - type: array - default: - additionalProperties: - properties: - host: - type: string - name: - type: string - type: object - type: object - observedGeneration: - format: int64 - type: integer - traffic: - type: integer - url: - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/gcp/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml deleted file mode 100644 index ede8bec645..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: Secret - - group: core - kind: ConfigMap - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - descriptor: - description: KFServing provides a Kubernetes Custom Resource Definition for serving - ML Models on arbitrary frameworks - keywords: - - kfserving - - inference - links: - - description: About - url: https://github.com/kubeflow/kfserving - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: kfserving - version: v0.4.1 - selector: - matchLabels: - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/gcp/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 220b228bde..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index b800e5cd81..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - name: config-volume diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1430335690..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 5be5cdbe47..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 0c0004b4f7..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-c644m77455 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-c644m77455 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/gcp/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml b/tests/stacks/gcp/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml deleted file mode 100644 index a2c14fbdd6..0000000000 --- a/tests/stacks/gcp/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager - namespace: kubeflow -spec: - selector: - matchLabels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - serviceName: controller-manager-service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - spec: - containers: - - args: - - --secure-listen-address=0.0.0.0:8443 - - --upstream=http://127.0.0.1:8080/ - - --logtostderr=true - - --v=10 - image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 - name: kube-rbac-proxy - ports: - - containerPort: 8443 - name: https - - args: - - --metrics-addr=127.0.0.1:8080 - command: - - /manager - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SECRET_NAME - value: kfserving-webhook-server-cert - image: gcr.io/kfserving/kfserving-controller:v0.4.1 - imagePullPolicy: Always - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - resources: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml b/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml deleted file mode 100644 index 2bee492dde..0000000000 --- a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: serving-cert - namespace: kubeflow -spec: - commonName: kfserving-webhook-server-service.kubeflow.svc - dnsNames: - - kfserving-webhook-server-service.kubeflow.svc - issuerRef: - kind: Issuer - name: selfsigned-issuer - secretName: kfserving-webhook-server-cert diff --git a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml b/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml deleted file mode 100644 index 66e2c6a096..0000000000 --- a/tests/stacks/gcp/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/gcp/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml b/tests/stacks/gcp/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml deleted file mode 100644 index d80509f7d0..0000000000 --- a/tests/stacks/gcp/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: anonymous - namespace: kubeflow -spec: - owner: - kind: User - name: anonymous diff --git a/tests/stacks/gcp/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/gcp/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/gcp/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/gcp/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml deleted file mode 100644 index 20101b5c10..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-manager-role.yaml +++ /dev/null @@ -1,169 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.knative.dev - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.knative.dev - resources: - - services/status - verbs: - - get - - patch - - update -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - - inferenceservices/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml deleted file mode 100644 index 3224dc4cac..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-role -rules: -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml deleted file mode 100644 index 4012a5d635..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kfserving-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml deleted file mode 100644 index a26a3d786d..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" - name: kubeflow-kfserving-edit -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml deleted file mode 100644 index 6882fb5538..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kfserving-view -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml deleted file mode 100644 index 8f8a8e11d5..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-manager-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-manager-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-manager-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml deleted file mode 100644 index 11a2758d7f..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-proxy-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-proxy-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml deleted file mode 100644 index 7cd6bb7453..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_leader-election-role.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml deleted file mode 100644 index f4c229a984..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_leader-election-rolebinding.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: leader-election-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/gcp/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/gcp/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml deleted file mode 100644 index 0af9fe8d4b..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - profile-name: anonymous - user: anonymous -kind: ConfigMap -metadata: - name: default-install-config-h877hbtmf7 - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml deleted file mode 100644 index 3dde29f148..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: v1 -data: - batcher: |- - { - "image" : "kfserving/batcher:v0.4.0", - "memoryRequest": "1Gi", - "memoryLimit": "1Gi", - "cpuRequest": "1", - "cpuLimit": "1" - } - credentials: |- - { - "gcs": { - "gcsCredentialFileName": "gcloud-application-credentials.json" - }, - "s3": { - "s3AccessKeyIDName": "AWS_ACCESS_KEY_ID", - "s3SecretAccessKeyName": "AWS_SECRET_ACCESS_KEY" - } - } - explainers: |- - { - "alibi": { - "image" : "gcr.io/kfserving/alibi-explainer", - "defaultImageVersion": "v0.4.1" - } - } - ingress: |- - { - "ingressGateway" : "kubeflow-gateway.kubeflow", - "ingressService" : "istio-ingressgateway.istio-system.svc.cluster.local" - } - logger: |- - { - "image" : "gcr.io/kfserving/logger:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1", - "defaultUrl": "http://default-broker" - } - predictors: |- - { - "tensorflow": { - "image": "tensorflow/serving", - "defaultImageVersion": "1.14.0", - "defaultGpuImageVersion": "1.14.0-gpu" - }, - "onnx": { - "image": "mcr.microsoft.com/onnxruntime/server", - "defaultImageVersion": "v1.0.0" - }, - "sklearn": { - "image": "gcr.io/kfserving/sklearnserver", - "defaultImageVersion": "v0.4.1" - }, - "xgboost": { - "image": "gcr.io/kfserving/xgbserver", - "defaultImageVersion": "v0.4.1" - }, - "pytorch": { - "image": "gcr.io/kfserving/pytorchserver", - "defaultImageVersion": "v0.4.1", - "defaultGpuImageVersion": "v0.4.1-gpu" - }, - "triton": { - "image": "nvcr.io/nvidia/tritonserver", - "defaultImageVersion": "20.03-py3" - } - } - storageInitializer: |- - { - "image" : "gcr.io/kfserving/storage-initializer:v0.4.1", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1" - } - transformers: |- - { - } -kind: ConfigMap -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: inferenceservice-config - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml deleted file mode 100644 index 43cdcb8de3..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml +++ /dev/null @@ -1,196 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-config-c644m77455.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-config-c644m77455.yaml deleted file mode 100644 index 56ef00f50c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-config-c644m77455.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - userid-header: x-goog-authenticated-user-email - userid-prefix: 'accounts.google.com:' -kind: ConfigMap -metadata: - name: kubeflow-config-c644m77455 - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml deleted file mode 100644 index 9963e3b53c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-minio-install-config-c42bb75m6g.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPd: dls-kf-storage-artifact-store - minioPvName: minio-pv -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-install-config-c42bb75m6g - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml deleted file mode 100644 index 4c8915b459..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-mysql-install-config-24c6km7cgg.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPd: dls-kf-storage-metadata-store - mysqlPvName: mysql-pv -kind: ConfigMap -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-install-config-24c6km7cgg - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9d9b1dcd68..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 0f695c21ce..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml deleted file mode 100644 index 993f221972..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_minio-pv.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolume -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv -spec: - accessModes: - - ReadWriteOnce - capacity: - storage: 20Gi - gcePersistentDisk: - fsType: ext4 - pdName: dls-kf-storage-artifact-store diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml deleted file mode 100644 index 17f07cff7b..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolume_mysql-pv.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: PersistentVolume -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv -spec: - accessModes: - - ReadWriteOnce - capacity: - storage: 20Gi - gcePersistentDisk: - fsType: ext4 - pdName: dls-kf-storage-metadata-store diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 66356a42ba..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi - storageClassName: "" - volumeName: minio-pv diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index f239b247a9..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi - storageClassName: "" - volumeName: mysql-pv diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml deleted file mode 100644 index 63dd5ee927..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-secret - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml deleted file mode 100644 index 2b1aa4879d..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8443" - prometheus.io/scheme: https - prometheus.io/scrape: "true" - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-metrics-service - namespace: kubeflow -spec: - ports: - - name: https - port: 8443 - targetPort: https - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml deleted file mode 100644 index 4ecffcb0a5..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml deleted file mode 100644 index 045fcdcdb8..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - kustomize.component: kfserving - name: kfserving-webhook-server-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 9443 - selector: - app: kfserving - app.kubernetes.io/component: kfserving - app.kubernetes.io/name: kfserving - control-plane: kfserving-controller-manager - kustomize.component: kfserving diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index ec6dbe5668..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index ce91ca7be0..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index fc5c8f073c..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-user@project-id.iam.gserviceaccount.com - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 0e2bd62a2d..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - iam.gke.io/gcp-service-account: name-admin@project-id.iam.gserviceaccount.com - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/gcp/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/generic/kustomize_test.go b/tests/stacks/generic/kustomize_test.go deleted file mode 100644 index 7425a102fc..0000000000 --- a/tests/stacks/generic/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package generic - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/generic", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/generic/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/generic/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/generic/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/generic/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/generic/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 4ab8f0bcee..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-988m2m9m87 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-988m2m9m87 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 29d00f9e72..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-988m2m9m87 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-988m2m9m87 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - name: config-volume diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 77004306de..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 3d8cd5347c..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d395adaed4..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1a60f06ce5..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 1fb43d9089..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 6416fe0fd4..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-988m2m9m87 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-988m2m9m87 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-988m2m9m87 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-988m2m9m87 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/generic/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/generic/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/generic/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/generic/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/generic/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/generic/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/generic/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml b/tests/stacks/generic/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml deleted file mode 100644 index d80509f7d0..0000000000 --- a/tests/stacks/generic/test_data/expected/kubeflow.org_v1beta1_profile_anonymous.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: anonymous - namespace: kubeflow -spec: - owner: - kind: User - name: anonymous diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/generic/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/generic/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml deleted file mode 100644 index 0af9fe8d4b..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_default-install-config-h877hbtmf7.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - profile-name: anonymous - user: anonymous -kind: ConfigMap -metadata: - name: default-install-config-h877hbtmf7 - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml deleted file mode 100644 index 43cdcb8de3..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml +++ /dev/null @@ -1,196 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_kubeflow-config-988m2m9m87.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_kubeflow-config-988m2m9m87.yaml deleted file mode 100644 index 9ba0edebb0..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_kubeflow-config-988m2m9m87.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - userid-header: X-Goog-Authenticated-User-Email - userid-prefix: 'accounts.google.com:' -kind: ConfigMap -metadata: - name: kubeflow-config-988m2m9m87 - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9d9b1dcd68..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 0f695c21ce..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/generic/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/generic/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/generic/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/generic/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/generic/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/generic/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/generic/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/application/add-anonymous-user-filter/kustomize_test.go b/tests/stacks/ibm/application/add-anonymous-user-filter/kustomize_test.go deleted file mode 100644 index 462d9f4d53..0000000000 --- a/tests/stacks/ibm/application/add-anonymous-user-filter/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package add_anonymous_user_filter - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/add-anonymous-user-filter", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml b/tests/stacks/ibm/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml deleted file mode 100644 index 2dc41b3220..0000000000 --- a/tests/stacks/ibm/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - name: add-user-filter - namespace: istio-system -spec: - filters: - - filterConfig: - inlineCode: | - function envoy_on_request(request_handle) - request_handle:headers():add("kubeflow-userid","anonymous@kubeflow.org") - end - filterName: envoy.lua - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - app: istio-ingressgateway diff --git a/tests/stacks/ibm/application/admission-webhook/kustomize_test.go b/tests/stacks/ibm/application/admission-webhook/kustomize_test.go deleted file mode 100644 index 1b29cdb253..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package admission_webhook - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/admission-webhook", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/ibm/application/admission-webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/kustomize_test.go b/tests/stacks/ibm/application/argo/kustomize_test.go deleted file mode 100644 index b812677b2d..0000000000 --- a/tests/stacks/ibm/application/argo/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package argo - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/argo", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/ibm/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/ibm/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 025357f80b..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: pns, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index a3eff61112..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: pns - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/ibm/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/application/bootstrap/kustomize_test.go b/tests/stacks/ibm/application/bootstrap/kustomize_test.go deleted file mode 100644 index 670016e93b..0000000000 --- a/tests/stacks/ibm/application/bootstrap/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package bootstrap - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/bootstrap", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml deleted file mode 100644 index 0d1f76622d..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - name: bootstrap - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: StatefulSet - - group: core - kind: ServiceAccount - descriptor: - description: Bootstraps the admission-webhook controller - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml deleted file mode 100644 index 876f92fe66..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-stateful-set - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - serviceName: service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - spec: - containers: - - command: - - sh - - /var/webhook-config/create_ca.sh - image: gcr.io/kubeflow-images-public/ingress-setup:latest - name: bootstrap - volumeMounts: - - mountPath: /var/webhook-config/ - name: admission-webhook-config - restartPolicy: Always - serviceAccountName: admission-webhook-bootstrap-service-account - volumes: - - configMap: - name: admission-webhook-bootstrap-config-map - name: admission-webhook-config - volumeClaimTemplates: [] diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml deleted file mode 100644 index 2289f1f769..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-cluster-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - "" - resources: - - secrets - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - list - - delete diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml deleted file mode 100644 index 3dc6fb1866..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-bootstrap-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-bootstrap-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml deleted file mode 100644 index 26aece64ff..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml +++ /dev/null @@ -1,139 +0,0 @@ -apiVersion: v1 -data: - create_ca.sh: | - #!/bin/bash - - set -e - - usage() { - cat <> ${tmpdir}/csr.conf - [req] - req_extensions = v3_req - distinguished_name = req_distinguished_name - [req_distinguished_name] - [ v3_req ] - basicConstraints = CA:FALSE - keyUsage = nonRepudiation, digitalSignature, keyEncipherment - extendedKeyUsage = serverAuth - subjectAltName = @alt_names - [alt_names] - DNS.1 = ${service} - DNS.2 = ${service}.${namespace} - DNS.3 = ${service}.${namespace}.svc - EOF - - openssl genrsa -out ${tmpdir}/server-key.pem 2048 - openssl req -new -key ${tmpdir}/server-key.pem -subj "/CN=${service}.${namespace}.svc" -out ${tmpdir}/server.csr -config ${tmpdir}/csr.conf - - # Self sign - openssl x509 -req -days 365 -in ${tmpdir}/server.csr -CA ${tmpdir}/self_ca.crt -CAkey ${tmpdir}/self_ca.key -CAcreateserial -out ${tmpdir}/server-cert.pem - - # create the secret with CA cert and server cert/key - kubectl create secret generic ${secret} \ - --from-file=key.pem=${tmpdir}/server-key.pem \ - --from-file=cert.pem=${tmpdir}/server-cert.pem \ - --dry-run -o yaml | - kubectl -n ${namespace} apply -f - - - # Webhook pod needs to be restarted so that the service reload the secret - # http://github.com/kueflow/kubeflow/issues/3227 - webhookPod=$(kubectl get pods -n ${namespace} |grep ${webhookDeploymentName} |awk '{print $1;}') - # ignore error if webhook pod does not exist - kubectl delete pod ${webhookPod} 2>/dev/null || true - echo "webhook ${webhookPod} is restarted to utilize the new secret" - - cat ${tmpdir}/self_ca.crt - - # -a means base64 encode - caBundle=$(cat ${tmpdir}/self_ca.crt | openssl enc -a -A) - echo ${caBundle} - - patchString='[{"op": "replace", "path": "/webhooks/0/clientConfig/caBundle", "value":"{{CA_BUNDLE}}"}]' - patchString=$(echo ${patchString} | sed "s|{{CA_BUNDLE}}|${caBundle}|g") - echo ${patchString} - - checkWebhookConfig() { - currentBundle=$(kubectl get mutatingwebhookconfigurations -n ${namespace} ${mutatingWebhookConfigName} -o jsonpath='{.webhooks[0].clientConfig.caBundle}') - [[ "$currentBundle" == "$caBundle" ]] - } - - while true; do - if ! checkWebhookConfig; then - echo "patching ca bundle for webhook configuration..." - kubectl patch mutatingwebhookconfiguration ${mutatingWebhookConfigName} \ - --type='json' -p="${patchString}" - fi - sleep 10 - done - namespace: kubeflow - webhookNamePrefix: admission-webhook- -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-config-map - namespace: kubeflow diff --git a/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml b/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml deleted file mode 100644 index 7b5e169dfa..0000000000 --- a/tests/stacks/ibm/application/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/name: bootstrap - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/cert-manager-crds/kustomize_test.go b/tests/stacks/ibm/application/cert-manager-crds/kustomize_test.go deleted file mode 100644 index 77624165ca..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/stacks/ibm/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/kustomize_test.go b/tests/stacks/ibm/application/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index 111bc9ac67..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index d8e47f2a94..0000000000 --- a/tests/stacks/ibm/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/stacks/ibm/application/cert-manager/kustomize_test.go b/tests/stacks/ibm/application/cert-manager/kustomize_test.go deleted file mode 100644 index 7d975b0c39..0000000000 --- a/tests/stacks/ibm/application/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 93e06c4304..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 36a2524012..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 21cdee5406..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 09a9cfab99..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index 6ae84bc8c0..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 33ab9729d5..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index 8a116d7b30..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 2a25e06d49..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 6ce5b8e0cc..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index f62a08529b..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index b0d464bfd5..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index ce897a6a3b..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index ad80b32de5..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index fb0a1201cf..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bea275aa9c..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index a276b13742..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index 13b98eeaae..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index d5f2de3e1b..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index bd1d73f13b..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 80792a8f24..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 7ee5331ba6..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bbc5ee440a..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 6a79270953..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index 854ffd11fe..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index 137f15e731..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index b19073be57..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index f40a39080a..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index d0a3fd2d22..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index adb10f9073..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index b25a401652..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index e71b15aaa6..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index 11c24d45c8..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index 882e257d96..0000000000 --- a/tests/stacks/ibm/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/kustomize_test.go b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/kustomize_test.go deleted file mode 100644 index a27cf77a0b..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway_1_3_1 - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/cluster-local-gateway-1-3-1", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 8192241e3a..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - strategy: - rollingUpdate: - maxSurge: null - maxUnavailable: null - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "false" - - name: ISTIO_META_WORKLOAD_NAME - value: cluster-local-gateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/cluster-local-gateway - image: docker.io/istio/proxyv2:1.3.1 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 5b01c913b8..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml deleted file mode 100644 index d65b3c311d..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-config - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway/kustomize_test.go b/tests/stacks/ibm/application/cluster-local-gateway/kustomize_test.go deleted file mode 100644 index 389d9ffafb..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/cluster-local-gateway", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 3a8a7a15c9..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,164 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: cluster-local-gateway - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index f412abdb0d..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index 91d90c9dcd..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-local-gateway-istio-system -subjects: -- kind: ServiceAccount - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml deleted file mode 100644 index d65b3c311d..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-config - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/ibm/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/dex-auth/kustomize_test.go b/tests/stacks/ibm/application/dex-auth/kustomize_test.go deleted file mode 100644 index 49ebf50eeb..0000000000 --- a/tests/stacks/ibm/application/dex-auth/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package dex_auth - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/dex-auth", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml deleted file mode 100644 index 196d4afd84..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: authcodes.dex.coreos.com -spec: - group: dex.coreos.com - names: - kind: AuthCode - listKind: AuthCodeList - plural: authcodes - singular: authcode - scope: Namespaced - version: v1 diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml deleted file mode 100644 index d4d54842cd..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: dex - name: dex - namespace: auth -spec: - replicas: 1 - selector: - matchLabels: - app: dex - template: - metadata: - labels: - app: dex - spec: - containers: - - command: - - dex - - serve - - /etc/dex/cfg/config.yaml - image: quay.io/dexidp/dex:v2.22.0 - name: dex - ports: - - containerPort: 5556 - name: http - volumeMounts: - - mountPath: /etc/dex/cfg - name: config - serviceAccountName: dex - volumes: - - configMap: - items: - - key: config.yaml - path: config.yaml - name: dex - name: config diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml deleted file mode 100644 index 242885f808..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: dex - namespace: auth -spec: - gateways: - - kubeflow/kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /dex/ - route: - - destination: - host: dex.auth.svc.cluster.local - port: - number: 5556 diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml deleted file mode 100644 index d4be922abe..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - name: dex -rules: -- apiGroups: - - dex.coreos.com - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml deleted file mode 100644 index 9cd13936f9..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - name: dex -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: dex -subjects: -- kind: ServiceAccount - name: dex - namespace: auth diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml deleted file mode 100644 index cdc02bf99f..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - dex_domain: dex.example.com - github_client_id: "" - github_client_secret: "" - github_hostname: "" - github_org_name: "" - github_use_login_as_id: "false" - issuer: http://dex.auth.svc.cluster.local:5556/dex - namespace: auth - oidc_redirect_uris: '["/login/oidc"]' - static_email: admin@example.com - static_password_hash: $2b$10$ztyRMtzZ.CgC7KKeHsJuku03GWTjt0d0ClcCz4J2qG2FdVnJB8a8a - static_user_id: 08a8684b-db88-4b73-90a9-3cd1661f5466 - static_username: admin -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: dex-parameters - namespace: auth diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml deleted file mode 100644 index e0c4ed65dc..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "issuer: http://dex.auth.svc.cluster.local:5556/dex\nstorage:\n type: - kubernetes\n config:\n inCluster: true\nweb:\n http: 0.0.0.0:5556\nlogger:\n - \ level: \"debug\"\n format: text\nconnectors:\n - type: github\n # Required - field for connector id.\n id: github\n # Required field for connector name.\n - \ name: GitHub\n config:\n # Credentials can be string literals or pulled - from the environment.\n clientID: \n clientSecret: \n redirectURI: - http://dex.auth.svc.cluster.local:5556/dex/callback\n # Optional organizations - and teams, communicated through the \"groups\" scope.\n #\n # NOTE: - This is an EXPERIMENTAL config option and will likely change.\n #\n orgs:\n - \ - name: \n # Required ONLY for GitHub Enterprise. Leave it empty when - using github.com.\n # This is the Hostname of the GitHub Enterprise account - listed on the\n # management console. Ensure this domain is routable on your - network.\n hostName: \n # Flag which indicates that all user groups - and teams should be loaded.\n loadAllGroups: false\n # flag which will - switch from using the internal GitHub id to the users handle (@mention) as the - user id.\n # It is possible for a user to change their own user name but - it is very rare for them to do so\n useLoginAsID: false\nstaticClients:\n- - id: kubeflow-oidc-authservice\n redirectURIs: [\"/login/oidc\"]\n name: 'Dex - Login Application'\n secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok\n" -kind: ConfigMap -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml deleted file mode 100644 index 6b34cabc07..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: auth diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml deleted file mode 100644 index 3ab9b4542d..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: dex - namespace: auth -spec: - ports: - - name: dex - nodePort: 32000 - port: 5556 - protocol: TCP - targetPort: 5556 - selector: - app: dex - type: NodePort diff --git a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml b/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml deleted file mode 100644 index 084f45058d..0000000000 --- a/tests/stacks/ibm/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/kustomize_test.go b/tests/stacks/ibm/application/istio-1-3-1-stack/kustomize_test.go deleted file mode 100644 index bc45e9d84c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_1_3_1_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/istio-1-3-1-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index d7aa03f87d..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 7edbd19816..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-adapter - kustomize.component: istio-crds - package: adapter - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index 7864def1ea..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml deleted file mode 100644 index 1180849525..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: authorizationpolicies.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: AuthorizationPolicy - plural: authorizationpolicies - singular: authorizationpolicy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 2a4631cf5e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 138b667371..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index f0e7d55b9d..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 6a7257c6db..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 00470c08e2..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index d3560e8cbb..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index 787adcd33c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index d08bd06c40..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-handler - kustomize.component: istio-crds - package: handler - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 5efdd1c1bd..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index f3c47edcf6..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 106fb5f240..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-instance - kustomize.component: istio-crds - package: instance - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index 18ab2ea4c9..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 8acfb192f2..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 796c9fa8e6..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index 7f6d447e54..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index cf34ff9565..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 782ac3f591..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 420974db07..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index e57f11c367..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index e52b86065a..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index bb19b9a158..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index f8b6e02a93..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index dcb1f2185e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 57df1e0445..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-template - kustomize.component: istio-crds - package: template - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index 26e9eb1a10..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml deleted file mode 100644 index ac07dec74a..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app: nodeagent - istio: nodeagent - name: istio-nodeagent - namespace: istio-system -spec: - selector: - matchLabels: - istio: nodeagent - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: nodeagent - istio: nodeagent - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: CA_ADDR - value: istio-citadel:8060 - - name: CA_PROVIDER - value: Citadel - - name: PLUGINS - value: "" - - name: VALID_TOKEN - value: "true" - - name: TRUST_DOMAIN - value: "" - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/istio-release/node-agent-k8s:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: nodeagent - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - serviceAccountName: istio-nodeagent-service-account - tolerations: - - effect: NoExecute - operator: Exists - - effect: NoSchedule - operator: Exists - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 71d2e3470e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: citadel - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - istio: citadel - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --sds-enabled=true - - --append-dns-names=true - - --grpc-port=8060 - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - - --workload-cert-ttl=2160h - env: - - name: CITADEL_ENABLE_NAMESPACES_BY_DEFAULT - value: "true" - image: gcr.io/istio-release/citadel:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 5b344bf192..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: galley - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - istio: galley - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=false - - --validation-webhook-config-file - - /etc/config/validating-webhook-configuration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - image: gcr.io/istio-release/galley:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 61171d41be..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - istio: ingressgateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - MUTUAL_TLS - - --discoveryAddress - - istio-pilot:15011 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "true" - - name: ISTIO_META_WORKLOAD_NAME - value: istio-ingressgateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/istio-ingressgateway - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 2287dd6a98..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - istio: pilot - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "1" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_OUTBOUND - value: "true" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_INBOUND - value: "false" - image: gcr.io/istio-release/pilot:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - requests: - cpu: 500m - memory: 2048Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - serviceAccountName: istio-pilot-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 27069e1098..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - istio: mixer - istio-mixer-type: policy - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --useTemplateCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index c2ef009a0f..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,117 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: sidecar-injector - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: gcr.io/istio-release/sidecar_injector:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - - key: values - path: values - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index dc32c6d0e8..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --certFile=/etc/certs/cert-chain.pem - - --keyFile=/etc/certs/key.pem - - --caCertFile=/etc/certs/root-cert.pem - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 4800m - memory: 4G - requests: - cpu: 1000m - memory: 1G - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index bd61a789cb..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yaml - image: docker.io/prom/prometheus:v2.8.0 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index b11d522036..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 5c0aeb158b..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index 96d1bb443e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index f8de3ad33a..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml deleted file mode 100644 index bc3e9b5c7e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - labels: - app: security - name: istio-security-post-install-release-1.3-latest-daily - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/istio-security-run.sh - - /tmp/security/istio-security-custom-resources.yaml - image: gcr.io/istio-release/kubectl:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index 194c9f3e74..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.proxy_version: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 2b48f38df5..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 6eb5203232..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 591f65ede8..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,213 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml deleted file mode 100644 index def828bfeb..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: attributes - namespace: istio-system -spec: - attributeBindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - compiledTemplate: kubernetes - params: - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml deleted file mode 100644 index d36350d7ce..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestcount - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml deleted file mode 100644 index e8e7f5cae8..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestduration - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml deleted file mode 100644 index 92a052306a..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestsize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml deleted file mode 100644 index 8fa51f640f..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: responsesize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml deleted file mode 100644 index 17059fe110..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytereceived - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml deleted file mode 100644 index 2916bd6d5c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytesent - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml deleted file mode 100644 index a11ed65696..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsclosed - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml deleted file mode 100644 index a54cf0fefc..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsopened - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 4f64a20efa..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 1bf9b97a14..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount - - requestduration - - requestsize - - responsesize - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) && (match((request.useragent | "-"), "Prometheus*") - == false) diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index ba53469288..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent - - tcpbytereceived - match: context.protocol == "tcp" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 88b56a9f61..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index d6a57b5eb4..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 359f4d4d82..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes - match: context.protocol == "tcp" diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 6bb534ca87..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index dcc865c1ce..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 504e447036..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 8ab724961f..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 48ef2e374c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ab4d9b137..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - istio: mixer - istio-mixer-type: policy - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml deleted file mode 100644 index 6b92933e30..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - istio: sidecar-injector diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index af62a9392d..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index b2b648f7bf..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - namespaces - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index b07c27bde8..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index e891d1f64e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 712d854b96..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fba93e72ed..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index e058905249..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 7dcde2e12d..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index f3d3217415..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 356d3081d9..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 0c41554f71..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 3cf724b359..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 416d69e15c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-nodeagent-istio-system -subjects: -- kind: ServiceAccount - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index eb97384bfa..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index 53b0c9ba50..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index ee14afcdaa..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 0d6ca7e082..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 7516510d7e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml deleted file mode 100644 index ccd2b2092a..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - rules: - - services: - - istio-ingressgateway.istio-system.svc.cluster.local diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml deleted file mode 100644 index 91340ebbb5..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - roleRef: - kind: ServiceRole - name: istio-ingressgateway - subjects: - - user: '*' diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index 81512e2b6c..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,120 +0,0 @@ -apiVersion: v1 -data: - validating-webhook-configuration.yaml: | - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - labels: - app: galley - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - sideEffects: None - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - - adapters - - handlers - - instances - - templates - - zipkins - failurePolicy: Fail - sideEffects: None -kind: ConfigMap -metadata: - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml deleted file mode 100644 index 693f99563e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - name: istio-install-config - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 3e86dfa9f0..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: v1 -data: - istio-security-custom-resources.yaml: | - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - spec: - peers: - - mtls: - mode: PERMISSIVE - istio-security-run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index af6866c735..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,405 +0,0 @@ -apiVersion: v1 -data: - config: |- - policy: enabled - alwaysInjectSelector: - [] - neverInjectSelector: - [] - template: |- - rewriteAppHTTPProbe: {{ valueOrDefault .Values.sidecarInjectorWebhook.rewriteAppHTTPProbe false }} - {{- if or (not .Values.istio_cni.enabled) .Values.global.proxy.enableCoreDump }} - initContainers: - {{ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `NONE` }} - {{- if not .Values.istio_cni.enabled }} - - name: istio-init - {{- if contains "/" .Values.global.proxy_init.image }} - image: "{{ .Values.global.proxy_init.image }}" - {{- else }} - image: "{{ .Values.global.hub }}/{{ .Values.global.proxy_init.image }}:{{ .Values.global.tag }}" - {{- end }} - args: - - "-p" - - "15001" - - "-z" - - "15006" - - "-u" - - 1337 - - "-m" - - "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - - "-i" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - - "-x" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - - "-b" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` `*` }}" - - "-d" - - "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") -}} - - "-o" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{ end -}} - {{ if (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -}} - - "-k" - - "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - {{ end -}} - imagePullPolicy: "{{ .Values.global.imagePullPolicy }}" - {{- if .Values.global.proxy.init.resources }} - resources: - {{ toYaml .Values.global.proxy.init.resources | indent 4 }} - {{- else }} - resources: {} - {{- end }} - securityContext: - runAsUser: 0 - runAsNonRoot: false - capabilities: - add: - - NET_ADMIN - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - restartPolicy: Always - {{- end }} - {{ end -}} - {{- if eq .Values.global.proxy.enableCoreDump true }} - - name: enable-core-dump - args: - - -c - - sysctl -w kernel.core_pattern=/var/lib/istio/core.proxy && ulimit -c unlimited - command: - - /bin/sh - image: {{ $.Values.global.proxy.enableCoreDumpImage }} - imagePullPolicy: IfNotPresent - resources: {} - securityContext: - runAsUser: 0 - runAsNonRoot: false - privileged: true - {{ end }} - {{- end }} - containers: - - name: istio-proxy - {{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}" - {{- else }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.hub }}/{{ .Values.global.proxy.image }}:{{ .Values.global.tag }}" - {{- end }} - ports: - - containerPort: 15090 - protocol: TCP - name: http-envoy-prom - args: - - proxy - - sidecar - - --domain - - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }} - - --configPath - - "{{ .ProxyConfig.ConfigPath }}" - - --binaryPath - - "{{ .ProxyConfig.BinaryPath }}" - - --serviceCluster - {{ if ne "" (index .ObjectMeta.Labels "app") -}} - - "{{ index .ObjectMeta.Labels `app` }}.$(POD_NAMESPACE)" - {{ else -}} - - "{{ valueOrDefault .DeploymentMeta.Name `istio-proxy` }}.{{ valueOrDefault .DeploymentMeta.Namespace `default` }}" - {{ end -}} - - --drainDuration - - "{{ formatDuration .ProxyConfig.DrainDuration }}" - - --parentShutdownDuration - - "{{ formatDuration .ProxyConfig.ParentShutdownDuration }}" - - --discoveryAddress - - "{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}" - {{- if eq .Values.global.proxy.tracer "lightstep" }} - - --lightstepAddress - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAddress }}" - - --lightstepAccessToken - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAccessToken }}" - - --lightstepSecure={{ .ProxyConfig.GetTracing.GetLightstep.GetSecure }} - - --lightstepCacertPath - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }}" - {{- else if eq .Values.global.proxy.tracer "zipkin" }} - - --zipkinAddress - - "{{ .ProxyConfig.GetTracing.GetZipkin.GetAddress }}" - {{- else if eq .Values.global.proxy.tracer "datadog" }} - - --datadogAgentAddress - - "{{ .ProxyConfig.GetTracing.GetDatadog.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.logLevel }} - - --proxyLogLevel={{ .Values.global.proxy.logLevel }} - {{- end}} - {{- if .Values.global.proxy.componentLogLevel }} - - --proxyComponentLogLevel={{ .Values.global.proxy.componentLogLevel }} - {{- end}} - - --dnsRefreshRate - - {{ .Values.global.proxy.dnsRefreshRate }} - - --connectTimeout - - "{{ formatDuration .ProxyConfig.ConnectTimeout }}" - {{- if .Values.global.proxy.envoyStatsd.enabled }} - - --statsdUdpAddress - - "{{ .ProxyConfig.StatsdUdpAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyMetricsService.enabled }} - - --envoyMetricsServiceAddress - - "{{ .ProxyConfig.GetEnvoyMetricsService.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyAccessLogService.enabled }} - - --envoyAccessLogService - - '{{ structToJSON .ProxyConfig.EnvoyAccessLogService }}' - {{- end }} - - --proxyAdminPort - - "{{ .ProxyConfig.ProxyAdminPort }}" - {{ if gt .ProxyConfig.Concurrency 0 -}} - - --concurrency - - "{{ .ProxyConfig.Concurrency }}" - {{ end -}} - - --controlPlaneAuthPolicy - - "{{ annotation .ObjectMeta `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy }}" - {{- if (ne (annotation .ObjectMeta "status.sidecar.istio.io/port" .Values.global.proxy.statusPort) "0") }} - - --statusPort - - "{{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }}" - - --applicationPorts - - "{{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` (applicationPorts .Spec.Containers) }}" - {{- end }} - {{- if .Values.global.trustDomain }} - - --trust-domain={{ .Values.global.trustDomain }} - {{- end }} - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_POD_PORTS - value: |- - [ - {{- range $index1, $c := .Spec.Containers }} - {{- range $index2, $p := $c.Ports }} - {{if or (ne $index1 0) (ne $index2 0)}},{{end}}{{ structToJSON $p }} - {{- end}} - {{- end}} - ] - - name: ISTIO_META_CLUSTER_ID - value: "{{ valueOrDefault .Values.global.multicluster.clusterName `Kubernetes` }}" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - {{- if eq .Values.global.proxy.tracer "datadog" }} - - name: HOST_IP - valueFrom: - fieldRef: - fieldPath: status.hostIP - {{- if isset .ObjectMeta.Annotations `apm.datadoghq.com/env` }} - {{- range $key, $value := fromJSON (index .ObjectMeta.Annotations `apm.datadoghq.com/env`) }} - - name: {{ $key }} - value: "{{ $value }}" - {{- end }} - {{- end }} - {{- end }} - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: {{ $.Values.global.sds.enabled }} - - name: ISTIO_META_INTERCEPTION_MODE - value: "{{ or (index .ObjectMeta.Annotations `sidecar.istio.io/interceptionMode`) .ProxyConfig.InterceptionMode.String }}" - - name: ISTIO_META_INCLUDE_INBOUND_PORTS - value: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (applicationPorts .Spec.Containers) }}" - {{- if .Values.global.network }} - - name: ISTIO_META_NETWORK - value: "{{ .Values.global.network }}" - {{- end }} - {{ if .ObjectMeta.Annotations }} - - name: ISTIO_METAJSON_ANNOTATIONS - value: | - {{ toJSON .ObjectMeta.Annotations }} - {{ end }} - {{ if .ObjectMeta.Labels }} - - name: ISTIO_METAJSON_LABELS - value: | - {{ toJSON .ObjectMeta.Labels }} - {{ end }} - {{- if .DeploymentMeta.Name }} - - name: ISTIO_META_WORKLOAD_NAME - value: {{ .DeploymentMeta.Name }} - {{ end }} - {{- if and .TypeMeta.APIVersion .DeploymentMeta.Name }} - - name: ISTIO_META_OWNER - value: kubernetes://api/{{ .TypeMeta.APIVersion }}/namespaces/{{ valueOrDefault .DeploymentMeta.Namespace `default` }}/{{ toLower .TypeMeta.Kind}}s/{{ .DeploymentMeta.Name }} - {{- end}} - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: ISTIO_BOOTSTRAP_OVERRIDE - value: "/etc/istio/custom-bootstrap/custom_bootstrap.json" - {{- end }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: ISTIO_META_SDS_TOKEN_PATH - value: "{{ .Values.global.sds.customTokenDirectory -}}/sdstoken" - {{- end }} - {{- if .Values.global.meshID }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.meshID }}" - {{- else if .Values.global.trustDomain }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.trustDomain }}" - {{- end }} - imagePullPolicy: {{ .Values.global.imagePullPolicy }} - {{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }} - readinessProbe: - httpGet: - path: /healthz/ready - port: {{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }} - initialDelaySeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` .Values.global.proxy.readinessInitialDelaySeconds }} - periodSeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` .Values.global.proxy.readinessPeriodSeconds }} - failureThreshold: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` .Values.global.proxy.readinessFailureThreshold }} - {{ end -}} - securityContext: - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - {{- if ne .Values.global.proxy.enableCoreDump true }} - readOnlyRootFilesystem: true - {{- end }} - {{ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY` -}} - capabilities: - add: - - NET_ADMIN - runAsGroup: 1337 - {{ else -}} - {{ if .Values.global.sds.enabled }} - runAsGroup: 1337 - {{- end }} - runAsUser: 1337 - {{- end }} - resources: - {{ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - requests: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -}} - cpu: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` }}" - {{ end}} - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - memory: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` }}" - {{ end }} - {{ else -}} - {{- if .Values.global.proxy.resources }} - {{ toYaml .Values.global.proxy.resources | indent 4 }} - {{- end }} - {{ end -}} - volumeMounts: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - mountPath: /etc/istio/custom-bootstrap - name: custom-bootstrap-volume - {{- end }} - - mountPath: /etc/istio/proxy - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - {{- if .Values.global.sds.customTokenDirectory }} - - mountPath: "{{ .Values.global.sds.customTokenDirectory -}}" - name: custom-sds-token - readOnly: true - {{- end }} - {{- else }} - - mountPath: /etc/certs/ - name: istio-certs - readOnly: true - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - mountPath: {{ directory .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }} - name: lightstep-certs - readOnly: true - {{- end }} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` }} - {{ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 4 }} - {{ end }} - {{- end }} - volumes: - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: custom-bootstrap-volume - configMap: - name: {{ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` "" }} - {{- end }} - - emptyDir: - medium: Memory - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - name: sds-uds-path - hostPath: - path: /var/run/sds - - name: istio-token - projected: - sources: - - serviceAccountToken: - path: istio-token - expirationSeconds: 43200 - audience: {{ .Values.global.sds.token.aud }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: custom-sds-token - secret: - secretName: sdstokensecret - {{- end }} - {{- else }} - - name: istio-certs - secret: - optional: true - {{ if eq .Spec.ServiceAccountName "" }} - secretName: istio.default - {{ else -}} - secretName: {{ printf "istio.%s" .Spec.ServiceAccountName }} - {{ end -}} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` }} - {{range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 2 }} - {{ end }} - {{ end }} - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - name: lightstep-certs - secret: - optional: true - secretName: lightstep.cacert - {{- end }} - {{- if .Values.global.podDNSSearchNamespaces }} - dnsConfig: - searches: - {{- range .Values.global.podDNSSearchNamespaces }} - - {{ render . }} - {{- end }} - {{- end }} - podRedirectAnnot: - sidecar.istio.io/interceptionMode: "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - traffic.sidecar.istio.io/includeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - traffic.sidecar.istio.io/excludeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - traffic.sidecar.istio.io/includeInboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (includeInboundPorts .Spec.Containers) }}" - traffic.sidecar.istio.io/excludeInboundPorts: "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") }} - traffic.sidecar.istio.io/excludeOutboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{- end }} - traffic.sidecar.istio.io/kubevirtInterfaces: "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - values: '{"certmanager":{"enabled":false},"galley":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"galley","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"gateways":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"istio-egressgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"labels":{"app":"istio-egressgateway","istio":"egressgateway"},"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"http2","port":80},{"name":"https","port":443},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/egressgateway-certs","name":"egressgateway-certs","secretName":"istio-egressgateway-certs"},{"mountPath":"/etc/istio/egressgateway-ca-certs","name":"egressgateway-ca-certs","secretName":"istio-egressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"ClusterIP"},"istio-ilbgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"labels":{"app":"istio-ilbgateway","istio":"ilbgateway"},"loadBalancerIP":"","nodeSelector":{},"podAnnotations":{},"ports":[{"name":"grpc-pilot-mtls","port":15011},{"name":"grpc-pilot","port":15010},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns","port":5353}],"resources":{"requests":{"cpu":"800m","memory":"512Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/ilbgateway-certs","name":"ilbgateway-certs","secretName":"istio-ilbgateway-certs"},{"mountPath":"/etc/istio/ilbgateway-ca-certs","name":"ilbgateway-ca-certs","secretName":"istio-ilbgateway-ca-certs"}],"serviceAnnotations":{"cloud.google.com/load-balancer-type":"internal"},"tolerations":[],"type":"LoadBalancer"},"istio-ingressgateway":{"applicationPorts":"","autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"externalIPs":[],"labels":{"app":"istio-ingressgateway","istio":"ingressgateway"},"loadBalancerIP":"","loadBalancerSourceRanges":[],"meshExpansionPorts":[{"name":"tcp-pilot-grpc-tls","port":15011,"targetPort":15011},{"name":"tcp-mixer-grpc-tls","port":15004,"targetPort":15004},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns-tls","port":853,"targetPort":853}],"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"status-port","port":15020,"targetPort":15020},{"name":"http2","nodePort":31380,"port":80,"targetPort":80},{"name":"https","nodePort":31390,"port":443},{"name":"tcp","nodePort":31400,"port":31400},{"name":"https-kiali","port":15029,"targetPort":15029},{"name":"https-prometheus","port":15030,"targetPort":15030},{"name":"https-grafana","port":15031,"targetPort":15031},{"name":"https-tracing","port":15032,"targetPort":15032},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sds":{"enabled":false,"image":"node-agent-k8s","resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}},"secretVolumes":[{"mountPath":"/etc/istio/ingressgateway-certs","name":"ingressgateway-certs","secretName":"istio-ingressgateway-certs"},{"mountPath":"/etc/istio/ingressgateway-ca-certs","name":"ingressgateway-ca-certs","secretName":"istio-ingressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"LoadBalancer"}},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"grafana":{"enabled":false},"istio_cni":{"enabled":false},"istiocoredns":{"enabled":false},"kiali":{"enabled":false},"mixer":{"adapters":{"kubernetesenv":{"enabled":true},"prometheus":{"enabled":true,"metricsExpiryDuration":"10m"},"stdio":{"enabled":false,"outputAsJson":true},"useAdapterCRDs":false},"env":{"GODEBUG":"gctrace=1","GOMAXPROCS":"6"},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"mixer","nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"policy":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%"},"telemetry":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"loadshedding":{"latencyThreshold":"100ms","mode":"enforce"},"replicaCount":1,"reportBatchMaxEntries":100,"reportBatchMaxTime":"1s","resources":{"limits":{"cpu":"4800m","memory":"4G"},"requests":{"cpu":"1000m","memory":"1G"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sessionAffinityEnabled":false},"tolerations":[]},"nodeagent":{"enabled":true,"env":{"CA_ADDR":"istio-citadel:8060","CA_PROVIDER":"Citadel","PLUGINS":"","VALID_TOKEN":true},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"node-agent-k8s","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"tolerations":[]},"pilot":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enableProtocolSniffingForInbound":false,"enableProtocolSniffingForOutbound":true,"enabled":true,"env":{"GODEBUG":"gctrace=1","PILOT_PUSH_THROTTLE":100},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"pilot","keepaliveMaxServerConnectionAge":"30m","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"resources":{"requests":{"cpu":"500m","memory":"2048Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sidecar":true,"tolerations":[],"traceSampling":1},"prometheus":{"contextPath":"/prometheus","enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"hub":"docker.io/prom","image":"prometheus","ingress":{"annotations":null,"enabled":false,"hosts":["prometheus.local"],"tls":null},"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"retention":"6h","scrapeInterval":"15s","security":{"enabled":true},"service":{"annotations":{},"nodePort":{"enabled":false,"port":32090}},"tag":"v2.8.0","tolerations":[]},"security":{"citadelHealthCheck":false,"createMeshPolicy":true,"enableNamespacesByDefault":true,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"citadel","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","selfSigned":true,"tolerations":[],"workloadCertTtl":"2160h"},"sidecarInjectorWebhook":{"alwaysInjectSelector":[],"enableNamespacesByDefault":false,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"sidecar_injector","neverInjectSelector":[],"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rewriteAppHTTPProbe":false,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"tracing":{"enabled":false}}' -kind: ConfigMap -metadata: - labels: - app: istio - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index 212eae498f..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: v1 -data: - mesh: |- - # Set the following variable to true to disable policy checks by the Mixer. - # Note that metrics will still be reported to the Mixer. - disablePolicyChecks: true - # reportBatchMaxEntries is the number of requests that are batched before telemetry data is sent to the mixer server - reportBatchMaxEntries: 100 - # reportBatchMaxTime is the max waiting time before the telemetry data of a request is sent to the mixer server - reportBatchMaxTime: 1s - - # Set enableTracing to false to disable request tracing. - enableTracing: true - - # Set accessLogFile to empty string to disable access log. - accessLogFile: "" - - # If accessLogEncoding is TEXT, value will be used directly as the log format - # example: "[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\n" - # If AccessLogEncoding is JSON, value will be parsed as map[string]string - # example: '{"start_time": "%START_TIME%", "req_method": "%REQ(:METHOD)%"}' - # Leave empty to use default log format - accessLogFormat: "" - - # Set accessLogEncoding to JSON or TEXT to configure sidecar access log - accessLogEncoding: 'TEXT' - - enableEnvoyAccessLogService: false - mixerCheckServer: istio-policy.istio-system.svc.cluster.local:15004 - mixerReportServer: istio-telemetry.istio-system.svc.cluster.local:15004 - # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached. - # Default is false which means the traffic is denied when the client is unable to connect to Mixer. - policyCheckFailOpen: false - # Let Pilot give ingresses the public IP of the Istio ingressgateway - ingressService: istio-ingressgateway - - # Default connect timeout for dynamic clusters generated by Pilot and returned via XDS - connectTimeout: 10s - - # Automatic protocol detection uses a set of heuristics to - # determine whether the connection is using TLS or not (on the - # server side), as well as the application protocol being used - # (e.g., http vs tcp). These heuristics rely on the client sending - # the first bits of data. For server first protocols like MySQL, - # MongoDB, etc., Envoy will timeout on the protocol detection after - # the specified period, defaulting to non mTLS plain TCP - # traffic. Set this field to tweak the period that Envoy will wait - # for the client to send the first bits of data. (MUST BE >=1ms) - protocolDetectionTimeout: 100ms - - # DNS refresh rate for Envoy clusters of type STRICT_DNS - dnsRefreshRate: 300s - - # Unix Domain Socket through which envoy communicates with NodeAgent SDS to get - # key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - sdsUdsPath: "unix:/var/run/sds/uds_path" - - # The trust domain corresponds to the trust root of a system. - # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain - trustDomain: "" - - # Set the default behavior of the sidecar for handling outbound traffic from the application: - # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no - # services or ServiceEntries for the destination port - # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well - # as those defined through ServiceEntries - outboundTrafficPolicy: - mode: ALLOW_ANY - localityLbSetting: - enabled: true - # The namespace to treat as the administrative root namespace for istio - # configuration. - rootNamespace: istio-system - configSources: - - address: istio-galley.istio-system.svc:9901 - tlsSettings: - mode: ISTIO_MUTUAL - - defaultConfig: - # - # TCP connection timeout between Envoy & the application, and between Envoys. Used for static clusters - # defined in Envoy's configuration file - connectTimeout: 10s - # - ### ADVANCED SETTINGS ############# - # Where should envoy's configuration be stored in the istio-proxy container - configPath: "/etc/istio/proxy" - binaryPath: "/usr/local/bin/envoy" - # The pseudo service name used for Envoy. - serviceCluster: istio-proxy - # These settings that determine how long an old Envoy - # process should be kept alive after an occasional reload. - drainDuration: 45s - parentShutdownDuration: 1m0s - # - # The mode used to redirect inbound connections to Envoy. This setting - # has no effect on outbound traffic: iptables REDIRECT is always used for - # outbound connections. - # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. - # The "REDIRECT" mode loses source addresses during redirection. - # If "TPROXY", use iptables TPROXY to redirect to Envoy. - # The "TPROXY" mode preserves both the source and destination IP - # addresses and ports, so that they can be used for advanced filtering - # and manipulation. - # The "TPROXY" mode also configures the sidecar to run with the - # CAP_NET_ADMIN capability, which is required to use TPROXY. - #interceptionMode: REDIRECT - # - # Port where Envoy listens (on local host) for admin commands - # You can exec into the istio-proxy container in a pod and - # curl the admin port (curl http://localhost:15000/) to obtain - # diagnostic information from Envoy. See - # https://lyft.github.io/envoy/docs/operations/admin.html - # for more details - proxyAdminPort: 15000 - # - # Set concurrency to a specific number to control the number of Proxy worker threads. - # If set to 0 (default), then start worker thread for each CPU thread/core. - concurrency: 2 - # - tracing: - zipkin: - # Address of the Zipkin collector - address: zipkin.istio-system:9411 - # - # Mutual TLS authentication between sidecars and istio control plane. - controlPlaneAuthPolicy: MUTUAL_TLS - # - # Address where istio Pilot service is running - discoveryAddress: istio-pilot.istio-system:15011 - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index bab14b0984..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,276 +0,0 @@ -apiVersion: v1 -data: - prometheus.yaml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index f394e916f9..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 852fd9feff..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index ea2d39ca12..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index a590dc8ab9..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - type: NodePort diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 7f7aac66b2..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 92eddb06cd..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 2013882d45..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - name: https-inject - port: 443 - - name: http-monitoring - port: 15014 - selector: - istio: sidecar-injector diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index b02397a061..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index 147fda3aac..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index bfd1afc2a9..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index a1fdfb36c4..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index 7d7230c868..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index 9630e83a84..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml deleted file mode 100644 index 74f7f7a736..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: nodeagent - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index 066bd7fa6e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index 26c77ce158..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index 3b225d382e..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 1cb719e1cd..0000000000 --- a/tests/stacks/ibm/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/kustomize_test.go b/tests/stacks/ibm/application/istio-stack/kustomize_test.go deleted file mode 100644 index ec5be112c4..0000000000 --- a/tests/stacks/ibm/application/istio-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/istio-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index 45f3d51ee0..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - release: istio - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 306a83db93..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: adapter - release: istio - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml deleted file mode 100644 index d0385f0e48..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: apikey - release: istio - name: apikeys.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: apikey - plural: apikeys - singular: apikey - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index b904f823e8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml deleted file mode 100644 index e7f9bb2ca1..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: authorization - release: istio - name: authorizations.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: authorization - plural: authorizations - singular: authorization - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml deleted file mode 100644 index 5d853a10d2..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: bypass - release: istio - name: bypasses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: bypass - plural: bypasses - singular: bypass - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 188a1093cd..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 08e76be423..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml deleted file mode 100644 index f31fc2477e..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: checknothing - release: istio - name: checknothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: checknothing - plural: checknothings - singular: checknothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml deleted file mode 100644 index e5b7194645..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: circonus - release: istio - name: circonuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: circonus - plural: circonuses - singular: circonus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml deleted file mode 100644 index 0c2c35ff0c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: cloudwatch - name: cloudwatches.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: cloudwatch - plural: cloudwatches - singular: cloudwatch - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index dea35ef84c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 366c18ebc7..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - heritage: Tiller - istio: rbac - release: istio - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml deleted file mode 100644 index 9d89ab9c83..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: denier - release: istio - name: deniers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: denier - plural: deniers - singular: denier - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 044b9a80e7..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml deleted file mode 100644 index 3e6d9dc8ef..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: dogstatsd - name: dogstatsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: dogstatsd - plural: dogstatsds - singular: dogstatsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml deleted file mode 100644 index 65099a24de..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: edge - release: istio - name: edges.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: edge - plural: edges - singular: edge - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index ed0739556e..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml deleted file mode 100644 index f3111ccc25..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: fluentd - release: istio - name: fluentds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: fluentd - plural: fluentds - singular: fluentd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index f7420c2f40..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index dab8c75f1b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-handler - package: handler - release: istio - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 1771daadae..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index cbf2f79146..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 9699fa820f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: instance - release: istio - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index a0c186a1d1..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml deleted file mode 100644 index 7b7da141af..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: kubernetesenv - release: istio - name: kubernetesenvs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetesenv - plural: kubernetesenvs - singular: kubernetesenv - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml deleted file mode 100644 index 91693505d6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: adapter.template.kubernetes - release: istio - name: kuberneteses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetes - plural: kuberneteses - singular: kubernetes - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml deleted file mode 100644 index cf59ae38ca..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: listchecker - release: istio - name: listcheckers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listchecker - plural: listcheckers - singular: listchecker - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml deleted file mode 100644 index 04806a76c8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: listentry - release: istio - name: listentries.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listentry - plural: listentries - singular: listentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml deleted file mode 100644 index d1d561e6da..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: logentry - release: istio - name: logentries.config.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.severity - description: The importance of the log entry - name: Severity - type: string - - JSONPath: .spec.timestamp - description: The time value for the log entry - name: Timestamp - type: string - - JSONPath: .spec.monitored_resource_type - description: Optional expression to compute the type of the monitored resource - this log entry is being recorded on - name: Res Type - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: logentry - plural: logentries - singular: logentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml deleted file mode 100644 index c36d6a5e64..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: memquota - release: istio - name: memquotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: memquota - plural: memquotas - singular: memquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 56fcaeb04d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml deleted file mode 100644 index 19a4a519c0..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: metric - release: istio - name: metrics.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: metric - plural: metrics - singular: metric - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml deleted file mode 100644 index c8cadbd41e..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: noop - release: istio - name: noops.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: noop - plural: noops - singular: noop - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml deleted file mode 100644 index 9368360492..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: opa - release: istio - name: opas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: opa - plural: opas - singular: opa - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 06d5359def..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index b9933dfd96..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml deleted file mode 100644 index 07d9e146fc..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: prometheus - release: istio - name: prometheuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: prometheus - plural: prometheuses - singular: prometheus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml deleted file mode 100644 index df929bfdd9..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: quota - release: istio - name: quotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: quota - plural: quotas - singular: quota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index 7434f2f66d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 53d48ab742..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 7883b0d7c3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml deleted file mode 100644 index a197d882a7..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: rbac - release: istio - name: rbacs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rbac - plural: rbacs - singular: rbac - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml deleted file mode 100644 index 15158d0df6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: redisquota - release: istio - name: redisquotas.config.istio.io -spec: - group: config.istio.io - names: - kind: redisquota - plural: redisquotas - singular: redisquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml deleted file mode 100644 index 899806b3a6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: reportnothing - release: istio - name: reportnothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: reportnothing - plural: reportnothings - singular: reportnothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index 40b5a703e5..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index db8fa18cb8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index 6228a334b0..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index 24d78ee506..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index 059355b082..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml deleted file mode 100644 index dfe2f4c61e..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: signalfx - release: istio - name: signalfxs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: signalfx - plural: signalfxs - singular: signalfx - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml deleted file mode 100644 index 6b758b40d9..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: solarwinds - release: istio - name: solarwindses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: solarwinds - plural: solarwindses - singular: solarwinds - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml deleted file mode 100644 index c3e9b39dcd..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stackdriver - release: istio - name: stackdrivers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stackdriver - plural: stackdrivers - singular: stackdriver - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml deleted file mode 100644 index 7b3da3e069..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: statsd - release: istio - name: statsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: statsd - plural: statsds - singular: statsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml deleted file mode 100644 index 1918fa9b19..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stdio - release: istio - name: stdios.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stdio - plural: stdios - singular: stdio - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 60c365f949..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-template - package: template - release: istio - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml deleted file mode 100644 index 677ffc60bb..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: tracespan - release: istio - name: tracespans.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: tracespan - plural: tracespans - singular: tracespan - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index fa7f9a0d80..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml deleted file mode 100644 index cfd1f91152..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: zipkin - name: zipkins.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: zipkin - plural: zipkins - singular: zipkin - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml deleted file mode 100644 index b4fba3181f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml +++ /dev/null @@ -1,152 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: GRAFANA_PORT - value: "3000" - - name: GF_AUTH_BASIC_ENABLED - value: "false" - - name: GF_AUTH_ANONYMOUS_ENABLED - value: "true" - - name: GF_AUTH_ANONYMOUS_ORG_ROLE - value: Admin - - name: GF_PATHS_DATA - value: /data/grafana - image: grafana/grafana:6.0.2 - imagePullPolicy: IfNotPresent - name: grafana - ports: - - containerPort: 3000 - readinessProbe: - httpGet: - path: /login - port: 3000 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /data/grafana - name: data - - mountPath: /var/lib/grafana/dashboards/istio/galley-dashboard.json - name: dashboards-istio-galley-dashboard - readOnly: true - subPath: galley-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-mesh-dashboard.json - name: dashboards-istio-istio-mesh-dashboard - readOnly: true - subPath: istio-mesh-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-performance-dashboard.json - name: dashboards-istio-istio-performance-dashboard - readOnly: true - subPath: istio-performance-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-service-dashboard.json - name: dashboards-istio-istio-service-dashboard - readOnly: true - subPath: istio-service-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-workload-dashboard.json - name: dashboards-istio-istio-workload-dashboard - readOnly: true - subPath: istio-workload-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/mixer-dashboard.json - name: dashboards-istio-mixer-dashboard - readOnly: true - subPath: mixer-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/pilot-dashboard.json - name: dashboards-istio-pilot-dashboard - readOnly: true - subPath: pilot-dashboard.json - - mountPath: /etc/grafana/provisioning/datasources/datasources.yaml - name: config - subPath: datasources.yaml - - mountPath: /etc/grafana/provisioning/dashboards/dashboardproviders.yaml - name: config - subPath: dashboardproviders.yaml - securityContext: - fsGroup: 472 - runAsUser: 472 - volumes: - - configMap: - name: istio-grafana - name: config - - emptyDir: {} - name: data - - configMap: - name: istio-grafana-configuration-dashboards-galley-dashboard - name: dashboards-istio-galley-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - name: dashboards-istio-istio-mesh-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - name: dashboards-istio-istio-performance-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-service-dashboard - name: dashboards-istio-istio-service-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - name: dashboards-istio-istio-workload-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-mixer-dashboard - name: dashboards-istio-mixer-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-pilot-dashboard - name: dashboards-istio-pilot-dashboard diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 8cf48324fd..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --append-dns-names=true - - --grpc-port=8060 - - --grpc-hostname=citadel - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - image: docker.io/istio/citadel:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml deleted file mode 100644 index 82a3fce5a3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml +++ /dev/null @@ -1,171 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-egressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-certs - name: egressgateway-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-ca-certs - name: egressgateway-ca-certs - readOnly: true - serviceAccountName: istio-egressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-egressgateway-service-account - - name: egressgateway-certs - secret: - optional: true - secretName: istio-egressgateway-certs - - name: egressgateway-ca-certs - secret: - optional: true - secretName: istio-egressgateway-ca-certs diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 9bdf1a9c23..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=true - - --validation-webhook-config-file - - /etc/config/validatingwebhookconfiguration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - - --enable-validation=true - image: docker.io/istio/galley:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 01d4547b36..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,177 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 3eaa8c4269..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "100" - - name: PILOT_DISABLE_XDS_MARSHALING_TO_ANY - value: "1" - image: docker.io/istio/pilot:1.1.6 - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - limits: - cpu: 100m - memory: 200Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - serviceAccountName: istio-pilot-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 204884f48a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,168 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index a7d7af79d5..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: docker.io/istio/sidecar_injector:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index e848f4ba90..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,172 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 50m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml deleted file mode 100644 index a67c51e985..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml +++ /dev/null @@ -1,99 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: istio-tracing - namespace: istio-system -spec: - selector: - matchLabels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - template: - metadata: - annotations: - prometheus.io/path: /jaeger/metrics - prometheus.io/port: "16686" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: COLLECTOR_ZIPKIN_HTTP_PORT - value: "9411" - - name: MEMORY_MAX_TRACES - value: "50000" - - name: QUERY_BASE_PATH - value: /jaeger - image: docker.io/jaegertracing/all-in-one:1.9 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: / - port: 16686 - name: jaeger - ports: - - containerPort: 9411 - - containerPort: 16686 - - containerPort: 5775 - protocol: UDP - - containerPort: 6831 - protocol: UDP - - containerPort: 6832 - protocol: UDP - readinessProbe: - httpGet: - path: / - port: 16686 - resources: - requests: - cpu: 10m diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml deleted file mode 100644 index 6bbccb9b25..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: kiali - template: - metadata: - annotations: - prometheus.io/port: "9090" - prometheus.io/scrape: "true" - scheduler.alpha.kubernetes.io/critical-pod: "" - sidecar.istio.io/inject: "false" - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /opt/kiali/kiali - - -config - - /kiali-configuration/config.yaml - - -v - - "4" - env: - - name: ACTIVE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: PROMETHEUS_SERVICE_URL - value: http://prometheus:9090 - - name: SERVER_WEB_ROOT - value: /kiali - image: docker.io/kiali/kiali:v0.16 - name: kiali - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /kiali-configuration - name: kiali-configuration - - mountPath: /kiali-secret - name: kiali-secret - serviceAccountName: kiali-service-account - volumes: - - configMap: - name: kiali - name: kiali-configuration - - name: kiali-secret - secret: - optional: true - secretName: kiali diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index 613cd2fe17..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,93 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yml - image: docker.io/prom/prometheus:v2.3.1 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml deleted file mode 100644 index cdbeef32e3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-egressgateway diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index c5a6bdd2d8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 1c3bd0a78a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index f33a22eeca..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index 8fc6b67d67..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml deleted file mode 100644 index e3cf64d5b2..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "3" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - -c - - | - kubectl get secret --all-namespaces | grep "istio.io/key-and-cert" | while read -r entry; do - ns=$(echo $entry | awk '{print $1}'); - name=$(echo $entry | awk '{print $2}'); - kubectl delete secret $name -n $ns; - done - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - restartPolicy: OnFailure - serviceAccountName: istio-cleanup-secrets-service-account diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml deleted file mode 100644 index 79d95f8258..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: istio-grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/grafana/run.sh - - /tmp/grafana/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - name: kubectl - volumeMounts: - - mountPath: /tmp/grafana - name: tmp-configmap-grafana - restartPolicy: OnFailure - serviceAccountName: istio-grafana-post-install-account - volumes: - - configMap: - name: istio-grafana-custom-resources - name: tmp-configmap-grafana diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml deleted file mode 100644 index f907dee1af..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/run.sh - - /tmp/security/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index d475e6bc55..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,138 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 6b39cc0347..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 41928afff6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv - params: null diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 7558b99229..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,216 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml deleted file mode 100644 index 2baf4e9096..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - compiledAdapter: stdio - params: - outputAsJson: true diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml deleted file mode 100644 index 1e66576783..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: kubernetes -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: attributes - namespace: istio-system -spec: - attribute_bindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml deleted file mode 100644 index c4098d4e17..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: accesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: request.time - variables: - apiClaims: request.auth.raw_claims | "" - apiKey: request.api_key | request.headers["x-api-key"] | "" - clientTraceId: request.headers["x-client-trace-id"] | "" - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - grpcMessage: response.grpc_message | "" - grpcStatus: response.grpc_status | "" - httpAuthority: request.headers[":authority"] | request.host | "" - latency: response.duration | "0ms" - method: request.method | "" - permissiveResponseCode: rbac.permissive.response_code | "none" - permissiveResponsePolicyID: rbac.permissive.effective_policy_id | "none" - protocol: request.scheme | context.protocol | "http" - receivedBytes: request.total_size | 0 - referer: request.referer | "" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestId: request.headers["x-request-id"] | "" - requestSize: request.size | 0 - requestedServerName: connection.requested_server_name | "" - responseCode: response.code | 0 - responseFlags: context.proxy_error_code | "" - responseSize: response.size | 0 - responseTimestamp: response.time - sentBytes: response.total_size | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - url: request.path | "" - userAgent: request.useragent | "" - xForwardedFor: request.headers["x-forwarded-for"] | "0.0.0.0" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml deleted file mode 100644 index 797b01697d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpaccesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: context.time | timestamp("2017-01-01T00:00:00Z") - variables: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - connectionDuration: connection.duration | "0ms" - connectionEvent: connection.event | "" - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - protocol: context.protocol | "tcp" - receivedBytes: connection.received.bytes | 0 - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestedServerName: connection.requested_server_name | "" - responseFlags: context.proxy_error_code | "" - sentBytes: connection.sent.bytes | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - totalReceivedBytes: connection.received.bytes_total | 0 - totalSentBytes: connection.sent.bytes_total | 0 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml deleted file mode 100644 index 5aa199b236..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestcount - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml deleted file mode 100644 index 914e4d4b5a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestduration - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml deleted file mode 100644 index 155343600d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestsize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml deleted file mode 100644 index d3aafb93c3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: responsesize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml deleted file mode 100644 index 33e8f468b9..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytereceived - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml deleted file mode 100644 index 39df34138c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytesent - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml deleted file mode 100644 index f2b80ce1d8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsclosed - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml deleted file mode 100644 index 68dbbf0c9c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsopened - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 16f89c981d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 6ba4b19caa..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount.metric - - requestduration.metric - - requestsize.metric - - responsesize.metric - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index 74466f18be..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent.metric - - tcpbytereceived.metric - match: context.protocol == "tcp" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 4414aa902c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index 5d119b596e..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml deleted file mode 100644 index 2d272125d1..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - accesslog.logentry - match: context.protocol == "http" || context.protocol == "grpc" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml deleted file mode 100644 index 339c38a2bd..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdiotcp - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - tcpaccesslog.logentry - match: context.protocol == "tcp" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 7e713777c2..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes - match: context.protocol == "tcp" diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 4bc62dd7f8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index 97db246c89..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml deleted file mode 100644 index a1c5f6ab12..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-egressgateway - istio: egressgateway - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 9a384b903b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 579d4ec2e0..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 73bd8933ad..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ac4f6464a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index ee5c3a1dee..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - release: istio diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index cb57ab8639..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index b31002df62..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - list - - delete diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 14745dd1b5..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index 31cd021e86..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,85 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml deleted file mode 100644 index f38f3710ac..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index ce57730853..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index 4c406989f2..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fbf58bcdd1..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index 06d72de038..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml deleted file mode 100644 index a00bd03674..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-viewer -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - servicecontrolreports - - servicecontrols - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - get - - list - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml deleted file mode 100644 index de91e8f85c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 4e42dfb6a6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index 28ac035ab6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index fcc37b18d8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "2" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-cleanup-secrets-istio-system -subjects: -- kind: ServiceAccount - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 291dd013b8..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-egressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 9c2ca1a82c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 473c34c42b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-grafana-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index c4b2804104..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-ingressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml deleted file mode 100644 index d1db23758b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: istio-kiali-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kiali -subjects: -- kind: ServiceAccount - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 8c801ce56f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index b7cccaacb3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - chart: istio-1.1.0 - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index fc78ced111..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index fc5d7a83d6..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index 455f52e864..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 57718cea6d..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 725830af27..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index cc77485872..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,123 +0,0 @@ -apiVersion: v1 -data: - validatingwebhookconfiguration.yaml: |- - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - namespace: istio-system - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - failurePolicy: Fail -kind: ConfigMap -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml deleted file mode 100644 index c7b460e359..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml +++ /dev/null @@ -1,341 +0,0 @@ -apiVersion: v1 -data: - galley-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- - Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", - "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 0 }, "id": 46, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"galley\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Galley Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 5 }, "id": 40, "panels": [], "title": "Resource Usage", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": - 6 }, "id": 36, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "process_virtual_memory_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Virtual Memory", - "refId": "A" }, { "expr": "process_resident_memory_bytes{job=\"galley\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", "refId": - "B" }, { "expr": "go_memstats_heap_sys_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "heap sys", "refId": "C" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "heap alloc", "refId": - "D" }, { "expr": "go_memstats_alloc_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F" }, { "expr": "go_memstats_heap_inuse_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": - "G" }, { "expr": "go_memstats_stack_inuse_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "H" }, { "expr": - "sum(container_memory_usage_bytes{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Total (kis)", "refId": - "E" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 6, "y": 6 }, "id": 38, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"}[1m]))", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": - "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}[1m])) by (container_name)", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B" - }, { "expr": "irate(process_cpu_seconds_total{job=\"galley\"}[1m])", "format": - "time_series", "intervalFactor": 2, "legendFormat": "galley (self-reported)", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 12, "y": 6 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"galley\"}", "format": "time_series", "intervalFactor": - 2, "legendFormat": "Open FDs (galley)", "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }} ", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeRegions": [], "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 6 }, "id": - 44, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "goroutines_total", - "refId": "A" }, { "expr": "galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "clients_total", "refId": "B" }, { "expr": - "go_goroutines{job=\"galley\"}/galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "avg_goroutines_per_client", "refId": "C" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 14 }, "id": 10, "panels": [], "title": "Runtime", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 15 }, "id": - 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(galley_runtime_strategy_on_change_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Strategy - Change Events", "refId": "A" }, { "expr": "sum(rate(galley_runtime_processor_events_processed_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Processed - Events", "refId": "B" }, { "expr": "sum(rate(galley_runtime_processor_snapshots_published_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Snapshot - Published", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Event Rates", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": "Events/min", "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": "", "logBase": 1, "max": null, "min": null, - "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 15 }, "id": 4, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(galley_runtime_strategy_timer_max_time_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Max Time - Reached", "refId": "A" }, { "expr": "sum(rate(galley_runtime_strategy_timer_quiesce_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Quiesce - Reached", "refId": "B" }, { "expr": "sum(rate(galley_runtime_strategy_timer_resets_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Timer Resets", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Timer Rates", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 15 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 3, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.50, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P50", "refId": - "A" }, { "expr": "histogram_quantile(0.90, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P90", "refId": - "B" }, { "expr": "histogram_quantile(0.95, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P95", "refId": - "C" }, { "expr": "histogram_quantile(0.99, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P99", "refId": - "D" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Events Per Snapshot", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by (typeURL) (galley_runtime_state_type_instances_total)", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ typeURL }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "State Type - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Count", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 27 }, "id": 34, "panels": [], "title": "Validation", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": - 28 }, "id": 28, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "galley_validation_cert_key_updates{job=\"galley\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Key Updates", "refId": - "A" }, { "expr": "galley_validation_cert_key_update_errors{job=\"galley\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Key Update Errors: {{ error - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], - "timeShift": null, "title": "Validation Webhook Certificate", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 28 }, "id": 30, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_passed{job=\"galley\"}) by (group, - version, resource)", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Passed: {{ group }}/{{ version }}/{{resource}}", "refId": "A" }, { "expr": "sum(galley_validation_failed{job=\"galley\"}) - by (group, version, resource, reason)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Failed: {{ group }}/{{ version }}/{{resource}} ({{ reason}})", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Resource Validation", "tooltip": { "shared": true, "sort": 0, - "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": - "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } - ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": - false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": - 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": 28 }, "id": 32, "legend": { "avg": - false, "current": false, "max": false, "min": false, "show": true, "total": false, - "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_http_error{job=\"galley\"}) by (status)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ status }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Validation HTTP Errors", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 34 }, "id": 12, "panels": [], "title": - "Kubernetes Source", "type": "row" }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 0, "y": 35 }, "id": 14, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_event_success_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Success", "refId": "A" }, { "expr": "rate(galley_source_kube_event_error_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Source Event Rate", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 35 }, "id": 16, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_dynamic_converter_success_total[1m]) * 60", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{apiVersion=\"{{apiVersion}}\",group=\"{{group}}\",kind=\"{{kind}}\"}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Successes", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Conversions/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": - 35 }, "id": 24, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(galley_source_kube_dynamic_converter_failure_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Failures", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Failures/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "collapsed": false, "gridPos": { "h": 1, "w": 24, "x": 0, "y": 41 - }, "id": 18, "panels": [], "title": "Mesh Configuration Protocol", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 42 }, "id": - 20, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(galley_mcp_source_clients_total)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Clients", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Connected Clients", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 42 }, "id": 22, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by(collection)(irate(galley_mcp_source_request_acks_total[1m]) * 60)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Request - ACKs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": "ACKs/min", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 42 }, "id": 26, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_mcp_source_request_nacks_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Request NACKs", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "NACKs/min", "logBase": 1, "max": null, "min": null, - "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, - "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } - } ], "refresh": "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": - { "list": [] }, "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Galley Dashboard", "uid": "TSEY6jLmk", "version": 1 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-galley-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml deleted file mode 100644 index 8be80d7176..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: v1 -data: - istio-mesh-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "singlestat", "name": - "Singlestat", "version": "5.0.0" }, { "type": "panel", "id": "table", "name": - "Table", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "content": - "
\n
\n Istio\n
\n
\n Istio - is an open platform - that provides a uniform way to connect,\n manage, and \n secure microservices.\n
\n Need help? Join the - Istio community.\n
\n
", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "50px", "id": 13, "links": - [], "mode": "html", "style": { "font-size": "18pt" }, "title": "", "transparent": - true, "type": "text" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": - false, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "datasource": "Prometheus", "format": "ops", "gauge": { "maxValue": - 100, "minValue": 0, "show": false, "thresholdLabels": false, "thresholdMarkers": - true }, "gridPos": { "h": 3, "w": 6, "x": 0, "y": 3 }, "id": 20, "interval": null, - "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", "value": - 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": - "connected", "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": - "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": - "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, - "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": "", "targets": - [ { "expr": "round(sum(irate(istio_requests_total{reporter=\"destination\"}[1m])), - 0.001)", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": "", "title": - "Global Request Volume", "transparent": false, "type": "singlestat", "valueFontSize": - "80%", "valueMaps": [ { "op": "=", "text": "N/A", "value": "null" } ], "valueName": - "avg" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": false, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "datasource": "Prometheus", "format": "percentunit", "gauge": { - "maxValue": 100, "minValue": 80, "show": false, "thresholdLabels": false, "thresholdMarkers": - false }, "gridPos": { "h": 3, "w": 6, "x": 6, "y": 3 }, "id": 21, "interval": - null, "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", - "value": 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, - "nullPointMode": "connected", "nullText": null, "postfix": "", "postfixFontSize": - "50%", "prefix": "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", - "text": "N/A", "to": "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, - 0.18)", "full": true, "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": - "", "targets": [ { "expr": "sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) / sum(rate(istio_requests_total{reporter=\"destination\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": - "95, 99, 99.5", "title": "Global Success Rate (non-5xx responses)", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 12, "y": 3 }, "id": 22, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"4.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "4xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 18, "y": 3 }, "id": 23, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"5.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "5xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "columns": [], "datasource": - "Prometheus", "fontSize": "100%", "gridPos": { "h": 21, "w": 24, "x": 0, "y": - 6 }, "hideTimeOverride": false, "id": 73, "links": [], "pageSize": null, "repeat": - null, "repeatDirection": "v", "scroll": true, "showHeader": true, "sort": { "col": - 4, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": false, "linkTargetBlank": - false, "linkTooltip": "Workload dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_2&var-workload=$__cell_", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": - "Time", "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Requests", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [], "type": "number", "unit": "ops" }, - { "alias": "P50 Latency", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "Value #B", "thresholds": [], "type": "number", - "unit": "s" }, { "alias": "P90 Latency", "colorMode": null, "colors": [ "rgba(245, - 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #D", "thresholds": [], - "type": "number", "unit": "s" }, { "alias": "P99 Latency", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value - #E", "thresholds": [], "type": "number", "unit": "s" }, { "alias": "Success Rate", - "colorMode": "cell", "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, - 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #F", "thresholds": [ ".95", " 1.00" ], "type": "number", - "unit": "percentunit" }, { "alias": "Workload", "colorMode": null, "colors": [ - "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": - "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-workload=$__cell_2&var-namespace=$__cell_3", - "pattern": "destination_workload_var", "thresholds": [], "type": "number", "unit": - "short" }, { "alias": "Service", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": "$__cell dashboard", - "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", "pattern": - "destination_service", "thresholds": [], "type": "string", "unit": "short" }, - { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, - 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", - "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": [], - "type": "hidden", "unit": "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_requests_total{reporter=\"destination\", - response_code=\"200\"}[1m])) by (destination_workload, destination_workload_namespace, - destination_service), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "intervalFactor": 1, "legendFormat": "{{ destination_workload}}.{{ destination_workload_namespace - }}", "refId": "A" }, { "expr": "label_join(histogram_quantile(0.50, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload}}.{{ destination_workload_namespace }}", "refId": "B" - }, { "expr": "label_join(histogram_quantile(0.90, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "D" - }, { "expr": "label_join(histogram_quantile(0.99, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "E" - }, { "expr": "label_join((sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) by (destination_workload, destination_workload_namespace) - / sum(rate(istio_requests_total{reporter=\"destination\"}[1m])) by (destination_workload, - destination_workload_namespace)), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "interval": "", "intervalFactor": 1, "legendFormat": "{{ destination_workload - }}.{{ destination_workload_namespace }}", "refId": "F" } ], "timeFrom": null, - "title": "HTTP/GRPC Workloads", "transform": "table", "transparent": false, "type": - "table" }, { "columns": [], "datasource": "Prometheus", "fontSize": "100%", "gridPos": - { "h": 18, "w": 24, "x": 0, "y": 27 }, "hideTimeOverride": false, "id": 109, "links": - [], "pageSize": null, "repeatDirection": "v", "scroll": true, "showHeader": true, - "sort": { "col": 2, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": - false, "linkTargetBlank": false, "linkTooltip": "$__cell dashboard", "linkUrl": - "/dashboard/db/istio-tcp-workload-dashboard?var-namespace=$__cell_2&&var-workload=$__cell", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Bytes Sent", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [ "" ], "type": "number", "unit": "Bps" - }, { "alias": "Bytes Received", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #C", "thresholds": [], - "type": "number", "unit": "Bps" }, { "alias": "", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Time", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Workload", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_3&var-workload=$__cell_2", - "pattern": "destination_workload_var", "thresholds": [], "type": "string", "unit": - "short" }, { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Service", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", - "pattern": "destination_service", "thresholds": [], "type": "number", "unit": - "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_tcp_received_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "C" }, { "expr": "label_join(sum(rate(istio_tcp_sent_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "A" } ], "timeFrom": null, "title": "TCP - Workloads", "transform": "table", "transparent": false, "type": "table" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 24, "x": 0, "y": 45 }, "id": 111, "legend": - { "alignAsTable": false, "avg": false, "current": false, "max": false, "min": - false, "rightSide": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(istio_build) by (component, tag)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ component }}: {{ tag }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Istio Components by Version", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "transparent": - false, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Mesh - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml deleted file mode 100644 index 0d56502d7a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml +++ /dev/null @@ -1,150 +0,0 @@ -apiVersion: v1 -data: - istio-performance-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 12, "x": 0, "y": 0 }, "id": 2, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m])) - / (round(sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m])), 0.001)/1000)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "istio-ingressgateway", "refId": "B" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", - "refId": "C" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU / 1k rps", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 12, "y": 0 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-ingressgateway", - "refId": "B" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", "refId": - "C" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 0, "y": 9 }, "id": 4, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "(sum(container_memory_usage_bytes{pod_name=~\"istio-telemetry-.*\"}) / (sum(irate(istio_requests_total[1m])) - / 1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry - / 1k rps", "refId": "A" }, { "expr": "sum(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\"}) - / count(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\",container_name!=\"POD\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-ingressgateway", - "refId": "C" }, { "expr": "sum(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"}) - / count(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-proxy", - "refId": "B" }, { "expr": "(sum(container_memory_usage_bytes{pod_name=~\"istio-policy-.*\"}) - / (sum(irate(istio_requests_total[1m])) / 1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy - / 1k rps", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "decbytes", "label": - null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 9, "w": 12, "x": 12, "y": 9 }, "id": 5, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-telemetry\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-telemetry\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m]))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "istio-ingressgateway", "refId": "C" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_response_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m])) + sum(irate(istio_request_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_request_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m]))", "format": "time_series", "intervalFactor": 1, - "legendFormat": "istio-proxy", "refId": "D" }, { "expr": "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-policy\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-policy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "E" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Bytes transferred / sec", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 24, "x": 0, "y": 18 }, "id": 8, "legend": { "alignAsTable": false, "avg": - false, "current": false, "max": false, "min": false, "rightSide": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build) by (component, - tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ component - }}: {{ tag }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Istio Components by Version", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "transparent": false, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "The charts on this dashboard are intended to show Istio - main components cost in terms resources utilization under steady load.\n\n- **vCPU/1k - rps:** shows vCPU utilization by the main Istio components normalized by 1000 - requests/second. When idle or low traffic, this chart will be blank. The curve - for istio-proxy refers to the services sidecars only. \n- **vCPU:** vCPU utilization - by Istio components, not normalized.\n- **Memory:** memory footprint for the components. - Telemetry and policy are normalized by 1k rps, and no data is shown when there - is no traffic. For ingress and istio-proxy, the data is per instance. \n- **Bytes - transferred/ sec:** shows the number of bytes flowing through each Istio component.", - "gridPos": { "h": 4, "w": 24, "x": 0, "y": 18 }, "id": 11, "links": [], "mode": - "markdown", "title": "Istio Performance Dashboard Readme", "type": "text" } ], - "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": [] }, - "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Performance Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml deleted file mode 100644 index d39f3a822a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml +++ /dev/null @@ -1,795 +0,0 @@ -apiVersion: v1 -data: - istio-service-dashboard.json: "{ \"annotations\": { \"list\": [ { \"builtIn\": 1, - \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": true, \"iconColor\": - \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", \"type\": \"dashboard\" - } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": 0, \"iteration\": - 1536442501501, \"links\": [], \"panels\": [ { \"content\": \"
\\nSERVICE: $service\\n
\", \"gridPos\": { \"h\": - 3, \"w\": 24, \"x\": 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", - \"title\": \"\", \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": - null, \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"rgba(245, - 54, 54, 0.9)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": - \"Prometheus\", \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Client Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 3 }, \"id\": 14, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Client Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Client Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 3 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m]))\", \"format\": \"time_series\", \"hide\": - false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" } ], \"thresholds\": - \"\", \"title\": \"TCP Received Bytes\", \"transparent\": false, \"type\": \"singlestat\", - \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", - \"value\": \"null\" } ], \"valueName\": \"avg\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 7 }, \"id\": 97, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Server Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 7 }, \"id\": 98, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Server Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 7 }, \"id\": 99, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Server Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 7 }, \"id\": 100, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m])) \", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Sent Bytes\", \"transparent\": false, - \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": - \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" }, { - \"content\": \"
\\nCLIENT - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"source\\\",source_workload=~\\\"$srcwl\\\",source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"source\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace }} : - {{ response_code }}\", \"refId\": \"A\", \"step\": 2 } ], \"thresholds\": [], - \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Requests by Source - And Response Code\", \"tooltip\": { \"shared\": false, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": - [ { \"format\": \"ops\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"description\": \"\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 20 }, \"id\": - 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, \"rightSide\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 20 }, \"id\": - 68, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": - 80, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, - \"alignLevel\": null } }, { \"content\": \"
\\nSERVICE - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 32 }, \"id\": 69, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 35 }, \"id\": 90, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"destination\\\",destination_workload=~\\\"$dstwl\\\",destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace, response_code), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"destination\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[5m])) by (destination_workload, - destination_workload_namespace, response_code), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }}\", \"refId\": \"A\", - \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Incoming Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null - } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 12, \"y\": 35 }, \"id\": 91, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", - \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], - \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming - Success Rate (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 41 }, \"id\": 94, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 95, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 96, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 92, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace}} (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace}}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Bytes Received from - Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": - true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, - \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, \"alignLevel\": - null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 12, \"x\": 12, \"y\": 47 }, \"id\": 93, \"legend\": { \"avg\": false, \"current\": - false, \"max\": false, \"min\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } } ], \"refresh\": \"10s\", \"schemaVersion\": - 16, \"style\": \"dark\", \"tags\": [], \"templating\": { \"list\": [ { \"allValue\": - null, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": false, \"label\": - \"Service\", \"multi\": false, \"name\": \"service\", \"options\": [], \"query\": - \"label_values(destination_service)\", \"refresh\": 1, \"regex\": \"\", \"sort\": - 0, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", - \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": \"All\", - \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": - true, \"label\": \"Client Workload Namespace\", \"multi\": true, \"name\": \"srcns\", - \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (source_workload_namespace) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\"}) by (source_workload_namespace))\", \"refresh\": - 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": { \"text\": \"All\", \"value\": \"$__all\" - }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": - \"Client Workload\", \"multi\": true, \"name\": \"srcwl\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", source_workload_namespace=~\\\"$srcns\\\"}) - by (source_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload Namespace\", \"multi\": true, - \"name\": \"dstns\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (destination_workload_namespace) or - sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\"}) - by (destination_workload_namespace))\", \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", - \"sort\": 2, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload\", \"multi\": true, \"name\": - \"dstwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Service Dashboard\", \"uid\": \"LJ_uJAvmk\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-service-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml deleted file mode 100644 index a3022b2cab..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml +++ /dev/null @@ -1,744 +0,0 @@ -apiVersion: v1 -data: - istio-workload-dashboard.json: "{ \"__inputs\": [ { \"name\": \"DS_PROMETHEUS\", - \"label\": \"Prometheus\", \"description\": \"\", \"type\": \"datasource\", \"pluginId\": - \"prometheus\", \"pluginName\": \"Prometheus\" } ], \"__requires\": [ { \"type\": - \"grafana\", \"id\": \"grafana\", \"name\": \"Grafana\", \"version\": \"5.0.4\" - }, { \"type\": \"panel\", \"id\": \"graph\", \"name\": \"Graph\", \"version\": - \"5.0.0\" }, { \"type\": \"datasource\", \"id\": \"prometheus\", \"name\": \"Prometheus\", - \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"singlestat\", \"name\": - \"Singlestat\", \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"text\", - \"name\": \"Text\", \"version\": \"5.0.0\" } ], \"annotations\": { \"list\": [ - { \"builtIn\": 1, \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": - true, \"iconColor\": \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", - \"type\": \"dashboard\" } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": - 0, \"id\": null, \"iteration\": 1531345461465, \"links\": [], \"panels\": [ { - \"content\": \"
\\nWORKLOAD: - $workload.$namespace\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": - 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", \"title\": \"\", - \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 8, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Incoming Request Volume\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"current\" }, { \"cacheTimeout\": null, \"colorBackground\": false, - \"colorValue\": false, \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(245, 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", - \"decimals\": null, \"format\": \"percentunit\", \"gauge\": { \"maxValue\": 100, - \"minValue\": 80, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": - false }, \"gridPos\": { \"h\": 4, \"w\": 8, \"x\": 8, \"y\": 3 }, \"id\": 14, - \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": - \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 - } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": null, - \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Incoming Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 8, - \"x\": 16, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"interval\": \"\", \"intervalFactor\": 1, \"legendFormat\": - \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P90\", - \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P99\", - \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Request Duration\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"cacheTimeout\": null, - \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"#299c46\", - \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": - \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": - false, \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": - 0, \"y\": 7 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": - 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": - \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": - \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", - \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": \"null\", - \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": \"rgba(31, - 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", \"show\": - true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\"}[1m])) - + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\"}[1m]))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Server Traffic\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": - \"Prometheus\", \"format\": \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": 12, \"y\": 7 }, \"id\": 85, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\"}[1m])) + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\"}[1m]))\", - \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"\", \"refId\": \"A\" } ], \"thresholds\": \"\", \"title\": \"TCP Client Traffic\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"avg\" }, { \"content\": \"
\\nINBOUND - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - source_workload }}.{{ source_workload_namespace }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Requests by Source And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 20 }, \"id\": 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 8, \"x\": 16, \"y\": 20 }, \"id\": 68, \"legend\": { \"alignAsTable\": false, - \"avg\": false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": - false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": false - }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Response Size By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"decbytes\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", - \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, - \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": - 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": 80, \"legend\": - { \"avg\": false, \"current\": false, \"max\": false, \"min\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}} - (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"content\": - \"
\\nOUTBOUND SERVICES\\n
\", - \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": 32 }, \"id\": 69, \"links\": - [], \"mode\": \"html\", \"title\": \"\", \"transparent\": true, \"type\": \"text\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 0, \"y\": 35 }, \"id\": 70, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"max\": false, \"min\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null as zero\", \"percentage\": false, \"pointradius\": 5, - \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, - \"legendFormat\": \"{{ destination_service }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 35 }, \"id\": 71, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Outgoing Success Rate (non-5xx responses) By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"description\": \"\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 41 }, \"id\": 72, \"legend\": { \"alignAsTable\": - false, \"avg\": false, \"current\": false, \"hideEmpty\": true, \"hideZero\": - false, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": - false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": - false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Duration by Destination\", \"tooltip\": { - \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 73, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 74, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 76, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent on Outgoing TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 47 }, \"id\": - 78, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Received from Outgoing TCP Connection\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] } ], \"refresh\": - \"10s\", \"schemaVersion\": 16, \"style\": \"dark\", \"tags\": [], \"templating\": - { \"list\": [ { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", - \"hide\": 0, \"includeAll\": false, \"label\": \"Namespace\", \"multi\": false, - \"name\": \"namespace\", \"options\": [], \"query\": \"query_result(sum(istio_requests_total) - by (destination_workload_namespace) or sum(istio_tcp_sent_bytes_total) by (destination_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*_namespace=\\\"([^\\\"]*).*/\", \"sort\": 0, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": false, \"label\": \"Workload\", \"multi\": false, \"name\": - \"workload\", \"options\": [], \"query\": \"query_result((sum(istio_requests_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_requests_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)) or (sum(istio_tcp_sent_bytes_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 1, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": {}, \"datasource\": - \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": \"Inbound Workload - Namespace\", \"multi\": true, \"name\": \"srcns\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace) - or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Inbound Workload\", \"multi\": true, \"name\": - \"srcwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload))\", \"refresh\": - 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", \"sort\": 3, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Destination Service\", \"multi\": true, - \"name\": \"dstsvc\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service) or sum(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service))\", \"refresh\": 1, \"regex\": \"/.*destination_service=\\\"([^\\\"]*).*/\", - \"sort\": 4, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Workload Dashboard\", \"uid\": \"UbsSZTDik\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml deleted file mode 100644 index 9a7f42a256..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml +++ /dev/null @@ -1,359 +0,0 @@ -apiVersion: v1 -data: - mixer-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "limit": - 100, "name": "Annotations & Alerts", "showIn": 0, "type": "dashboard" } ] }, "editable": - false, "gnetId": null, "graphTooltip": 1, "id": null, "iteration": 1543881232533, - "links": [], "panels": [ { "content": "

Deployed Versions

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "40", "id": 62, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 3 }, "id": 64, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"mixer\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Mixer Versions", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "

Resource Usage

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(process_virtual_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "instant": false, "intervalFactor": 2, "legendFormat": - "Virtual Memory ({{ job }})", "refId": "I" }, { "expr": "sum(process_resident_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident - Memory ({{ job }})", "refId": "H" }, { "expr": "sum(go_memstats_heap_sys_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap sys ({{ job }})", "refId": "A" }, { "expr": "sum(go_memstats_heap_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap alloc ({{ job }})", "refId": "D" }, { "expr": "sum(go_memstats_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Alloc - ({{ job }})", "refId": "F" }, { "expr": "sum(go_memstats_heap_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "Heap in-use ({{ job }})", "refId": "E" }, { "expr": "sum(go_memstats_stack_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Stack - in-use ({{ job }})", "refId": "G" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (service)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "C" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Memory", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "bytes", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": 11 }, "id": 6, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (pod_name), \"service\", - \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "A" }, { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (container_name, pod_name), - \"service\", \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" }, { "expr": "sum(irate(process_cpu_seconds_total{job=~\"istio-telemetry|istio-policy\"}[1m])) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "{{ job }} (self-reported)", "refId": "C" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(process_open_fds{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "hide": true, "instant": false, "interval": "", "intervalFactor": - 2, "legendFormat": "Open FDs ({{ job }})", "refId": "A" }, { "expr": "sum(label_replace(container_fs_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "{{ service }} - {{ container_name - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Disk", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "decimals": null, "format": "none", - "label": "", "logBase": 1024, "max": null, "min": null, "show": false } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 7, "w": 6, "x": 18, "y": 11 }, "id": 4, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": false, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(go_goroutines{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines ({{ - job }})", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Mixer Overview

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 18 }, "height": "40px", "id": 30, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 0, "y": 21 }, "id": 9, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "mixer (Total)", - "refId": "B" }, { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m])) by (grpc_server_method)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "mixer ({{ grpc_server_method - }})", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Incoming Requests", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 6, "x": 6, "y": 21 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [ { - "alias": "{}", "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": - false, "targets": [ { "expr": "histogram_quantile(0.5, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.5", "refId": "B" }, { "expr": "histogram_quantile(0.9, - sum(rate(grpc_io_server_server_latency_bucket{}[1m])) by (grpc_server_method, - le))", "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ grpc_server_method - }} 0.9", "refId": "C" }, { "expr": "histogram_quantile(0.99, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.99", "refId": "D" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Response Durations", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "ms", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 12, "y": 21 }, "id": - 11, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(grpc_server_handled_total{grpc_code=~\"Unknown|Unimplemented|Internal|DataLoss\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Server Error Rate (5xx responses)", "tooltip": { - "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 18, "y": - 21 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(irate(grpc_server_handled_total{grpc_code!=\"OK\",grpc_service=~\".*Mixer\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Non-successes (4xxs)", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "content": - "

Adapters and Config

", "gridPos": { "h": 3, "w": 24, - "x": 0, "y": 27 }, "id": 28, "links": [], "mode": "html", "title": "", "transparent": - true, "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, - "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": - 12, "x": 0, "y": 30 }, "id": 13, "legend": { "avg": false, "current": false, "max": - false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(mixer_runtime_dispatches_total{adapter=~\"$adapter\"}[1m])) by (adapter)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ adapter }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Adapter Dispatch Count", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 30 }, "id": 14, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.5, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p50", "refId": "A" }, { "expr": "histogram_quantile(0.9, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p90 ", "refId": "B" }, { "expr": "histogram_quantile(0.99, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p99", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Adapter Dispatch Duration", "tooltip": { "shared": true, "sort": - 1, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "s", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 37 }, "id": 60, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "scalar(topk(1, max(mixer_config_rule_config_count) by - (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": "Rules", - "refId": "A" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Config Errors", "refId": "B" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_match_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Match Errors", "refId": "C" }, { "expr": "scalar(topk(1, max(mixer_config_unsatisfied_action_handler_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Unsatisfied Actions", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Rules", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 6, "y": 37 }, "id": 56, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_instance_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Instances", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Instances - in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 37 }, "id": 54, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_handler_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Handlers", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Handlers in - Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 18, "y": 37 }, "id": 58, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_attribute_count) by (configID)))", "format": - "time_series", "instant": false, "intervalFactor": 1, "legendFormat": "Attributes", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Attributes in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Individual Adapters

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 44 }, "id": 23, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 47 }, "id": 46, "panels": [], "repeat": - "adapter", "title": "$adapter Adapter", "type": "row" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 12, "x": 0, "y": 48 }, "id": 17, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(irate(mixer_runtime_dispatches_total{adapter=\"$adapter\"}[1m]),\"handler\", - \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ handler }} (error: {{ error }})", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Dispatch - Count By Handler", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 48 }, "id": 18, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(histogram_quantile(0.5, sum(rate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p50 - {{ handler_short - }} (error: {{ error }})", "refId": "A" }, { "expr": "label_replace(histogram_quantile(0.9, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p90 - {{ handler_short - }} (error: {{ error }})", "refId": "D" }, { "expr": "label_replace(histogram_quantile(0.99, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p99 - {{ handler_short - }} (error: {{ error }})", "refId": "E" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Dispatch Duration By Handler", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "s", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": - "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": - [ { "allValue": null, "current": {}, "datasource": "Prometheus", "hide": 0, "includeAll": - true, "label": "Adapter", "multi": true, "name": "adapter", "options": [], "query": - "label_values(adapter)", "refresh": 2, "regex": "", "sort": 1, "tagValuesQuery": - "", "tags": [], "tagsQuery": "", "type": "query", "useTags": false } ] }, "time": - { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", - "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ - "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Mixer Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-mixer-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml deleted file mode 100644 index 32987ba7de..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml +++ /dev/null @@ -1,307 +0,0 @@ -apiVersion: v1 -data: - pilot-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": - "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, "gnetId": - null, "graphTooltip": 1, "id": null, "links": [], "panels": [ { "content": "

Deployed - Versions

", "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": - "40", "id": 58, "links": [], "mode": "html", "title": "", "transparent": true, - "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": - false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": - 0, "y": 3 }, "id": 56, "legend": { "avg": false, "current": false, "max": false, - "min": false, "show": true, "total": false, "values": false }, "lines": true, - "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": - 5, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": - 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build{component=\"pilot\"}) - by (tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ tag - }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Pilot Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Resource Usage

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "process_virtual_memory_bytes{job=\"pilot\"}", "format": - "time_series", "instant": false, "intervalFactor": 2, "legendFormat": "Virtual - Memory", "refId": "I", "step": 2 }, { "expr": "process_resident_memory_bytes{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", - "refId": "H", "step": 2 }, { "expr": "go_memstats_heap_sys_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - sys", "refId": "A" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - alloc", "refId": "D" }, { "expr": "go_memstats_alloc_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F", "step": - 2 }, { "expr": "go_memstats_heap_inuse_bytes{job=\"pilot\"}", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": "E", - "step": 2 }, { "expr": "go_memstats_stack_inuse_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "G", - "step": 2 }, { "expr": "sum(container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"})", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "Total (k8s)", "refId": "C", "step": 2 }, { "expr": "container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B", "step": 2 } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Memory", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "bytes", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": - 11 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m]))", "format": "time_series", "hide": false, - "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": "A", "step": 2 }, - { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m])) by (container_name)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", - "refId": "B", "step": 2 }, { "expr": "irate(process_cpu_seconds_total{job=\"pilot\"}[1m])", - "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "pilot - (self-reported)", "refId": "C", "step": 2 } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"pilot\"}", "format": "time_series", "hide": true, "instant": - false, "interval": "", "intervalFactor": 2, "legendFormat": "Open FDs (pilot)", - "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }}", "refId": "B", "step": 2 } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "bytes", "label": "", "logBase": 1, "max": null, "min": null, "show": - true }, { "decimals": null, "format": "none", "label": "", "logBase": 1024, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 18, "y": - 11 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": false, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines", - "refId": "A", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

xDS

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 18 }, "id": 28, "links": [], "mode": "html", "title": - "", "transparent": true, "type": "text" }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 6, "w": 8, "x": 0, "y": 21 }, "id": 40, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 1, "legendFormat": "XDS GRPC Successes", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Updates", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "round(sum(rate(envoy_cluster_update_attempt{cluster_name=\"xds-grpc\"}[1m])) - - sum(rate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m])))", "format": - "time_series", "intervalFactor": 2, "legendFormat": "XDS GRPC ", "refId": "A", - "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Failures", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 21 }, "id": 41, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(envoy_cluster_upstream_cx_active{cluster_name=\"xds-grpc\"})", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Pilot (XDS GRPC)", "refId": - "C", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Active Connections", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 8, "x": 0, "y": 27 }, "id": 45, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "pilot_conflict_inbound_listener{job=\"pilot\"}", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Inbound Listeners", "refId": "B" }, { "expr": "pilot_conflict_outbound_listener_http_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (http over current tcp)", "refId": "A" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current tcp)", "refId": "C" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_http{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current http)", "refId": "D" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Conflicts", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 8, "y": 27 }, "id": 47, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "pilot_virt_services{job=\"pilot\"}", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Virtual Services", "refId": "A" }, { "expr": - "pilot_services{job=\"pilot\"}", "format": "time_series", "intervalFactor": 1, - "legendFormat": "Services", "refId": "B" }, { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "hide": true, "intervalFactor": 1, "legendFormat": "Rejected CDS Configs - {{ - node }}: {{ err }}", "refId": "C" }, { "expr": "pilot_xds_eds_reject{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 1, "legendFormat": "Rejected - EDS Configs", "refId": "D" }, { "expr": "pilot_xds{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Connected Endpoints", "refId": - "E" }, { "expr": "rate(pilot_xds_write_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Write Timeouts", "refId": - "F" }, { "expr": "rate(pilot_xds_push_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Push Timeouts", "refId": - "G" }, { "expr": "rate(pilot_xds_pushes{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Pushes ({{ type }})", "refId": "H" }, { - "expr": "rate(pilot_xds_push_errors{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Push Errors ({{ type }})", "refId": "I" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "ADS Monitoring", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 16, "y": - 27 }, "id": 49, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{ err }})", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected CDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 0, "y": 35 }, "id": 52, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_eds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected EDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 8, "y": - 35 }, "id": 54, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_lds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected LDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 16, "y": 35 }, "id": 53, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_rds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected RDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": { "outbound|80||default-http-backend.kube-system.svc.cluster.local": - "rgba(255, 255, 255, 0.97)" }, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 0, "y": - 42 }, "id": 51, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [ { "alias": "outbound|80||default-http-backend.kube-system.svc.cluster.local", - "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": - [ { "expr": "sum(pilot_xds_eds_instances{job=\"pilot\"}) by (cluster)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ cluster }}", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "EDS - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Pilot - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-pilot-dashboard - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml deleted file mode 100644 index 6329dad866..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - apiVersion: authentication.istio.io/v1alpha1 - kind: Policy - metadata: - name: grafana-ports-mtls-disabled - namespace: istio-system - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - targets: - - name: grafana - ports: - - number: 3000 - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-custom-resources - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml deleted file mode 100644 index 251c4e2669..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -data: - dashboardproviders.yaml: | - apiVersion: 1 - providers: - - disableDeletion: false - folder: istio - name: istio - options: - path: /var/lib/grafana/dashboards/istio - orgId: 1 - type: file - datasources.yaml: | - apiVersion: 1 - datasources: - - access: proxy - editable: true - isDefault: true - jsonData: - timeInterval: 5s - name: Prometheus - orgId: 1 - type: prometheus - url: http://prometheus:9090 -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 337758a25f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - chart: security - heritage: Tiller - release: istio - spec: - peers: - - mtls: - mode: PERMISSIVE - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index 03832c4720..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: v1 -data: - config: "policy: enabled\ntemplate: |-\n rewriteAppHTTPProbe: false\n initContainers:\n - \ [[ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"NONE\" ]]\n - name: istio-init\n image: \"docker.io/istio/proxy_init:1.1.6\"\n - \ args:\n - \"-p\"\n - [[ .MeshConfig.ProxyListenPort ]]\n - \"-u\"\n - \ - 1337\n - \"-m\"\n - [[ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` - .ProxyConfig.InterceptionMode ]]\n - \"-i\"\n - \"[[ annotation .ObjectMeta - `traffic.sidecar.istio.io/includeOutboundIPRanges` \"*\" ]]\"\n - \"-x\"\n - \ - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` - \ \"\" ]]\"\n - \"-b\"\n - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` - (includeInboundPorts .Spec.Containers) ]]\"\n - \"-d\"\n - \"[[ excludeInboundPort - (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 ) (annotation .ObjectMeta - `traffic.sidecar.istio.io/excludeInboundPorts` \"\" ) ]]\"\n [[ if (isset - .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -]]\n - - \"-k\"\n - \"[[ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` - ]]\"\n [[ end -]]\n imagePullPolicy: IfNotPresent\n resources:\n requests:\n - \ cpu: 10m\n memory: 10Mi\n limits:\n cpu: 100m\n memory: - 50Mi\n securityContext:\n runAsUser: 0\n runAsNonRoot: false\n capabilities:\n - \ add:\n - NET_ADMIN\n restartPolicy: Always\n [[ end -]]\n containers:\n - \ - name: istio-proxy\n image: [[ annotation .ObjectMeta `sidecar.istio.io/proxyImage` - \ \"docker.io/istio/proxyv2:1.1.6\" ]]\n ports:\n - containerPort: 15090\n - \ protocol: TCP\n name: http-envoy-prom\n args:\n - proxy\n - - sidecar\n - --domain\n - $(POD_NAMESPACE).svc.cluster.local\n - --configPath\n - \ - [[ .ProxyConfig.ConfigPath ]]\n - --binaryPath\n - [[ .ProxyConfig.BinaryPath - ]]\n - --serviceCluster\n [[ if ne \"\" (index .ObjectMeta.Labels \"app\") - -]]\n - [[ index .ObjectMeta.Labels \"app\" ]].$(POD_NAMESPACE)\n [[ else - -]]\n - [[ valueOrDefault .DeploymentMeta.Name \"istio-proxy\" ]].[[ valueOrDefault - .DeploymentMeta.Namespace \"default\" ]]\n [[ end -]]\n - --drainDuration\n - \ - [[ formatDuration .ProxyConfig.DrainDuration ]]\n - --parentShutdownDuration\n - \ - [[ formatDuration .ProxyConfig.ParentShutdownDuration ]]\n - --discoveryAddress\n - \ - [[ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress - ]]\n - --zipkinAddress\n - [[ .ProxyConfig.GetTracing.GetZipkin.GetAddress - ]]\n - --connectTimeout\n - [[ formatDuration .ProxyConfig.ConnectTimeout - ]]\n - --proxyAdminPort\n - [[ .ProxyConfig.ProxyAdminPort ]]\n [[ if - gt .ProxyConfig.Concurrency 0 -]]\n - --concurrency\n - [[ .ProxyConfig.Concurrency - ]]\n [[ end -]]\n - --controlPlaneAuthPolicy\n - [[ annotation .ObjectMeta - `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy - ]]\n [[- if (ne (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 - ) \"0\") ]]\n - --statusPort\n - [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n - --applicationPorts\n - \"[[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` - (applicationPorts .Spec.Containers) ]]\"\n [[- end ]]\n env:\n - name: - POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - \ - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: - metadata.namespace\n - name: INSTANCE_IP\n valueFrom:\n fieldRef:\n - \ fieldPath: status.podIP\n \n - name: ISTIO_META_POD_NAME\n valueFrom:\n - \ fieldRef:\n fieldPath: metadata.name\n - name: ISTIO_META_CONFIG_NAMESPACE\n - \ valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - \ - name: ISTIO_META_INTERCEPTION_MODE\n value: [[ or (index .ObjectMeta.Annotations - \"sidecar.istio.io/interceptionMode\") .ProxyConfig.InterceptionMode.String ]]\n - \ [[ if .ObjectMeta.Annotations ]]\n - name: ISTIO_METAJSON_ANNOTATIONS\n - \ value: |\n [[ toJSON .ObjectMeta.Annotations ]]\n [[ end - ]]\n [[ if .ObjectMeta.Labels ]]\n - name: ISTIO_METAJSON_LABELS\n value: - |\n [[ toJSON .ObjectMeta.Labels ]]\n [[ end ]]\n [[- if (isset - .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) ]]\n - name: - ISTIO_BOOTSTRAP_OVERRIDE\n value: \"/etc/istio/custom-bootstrap/custom_bootstrap.json\"\n - \ [[- end ]]\n imagePullPolicy: IfNotPresent\n [[ if (ne (annotation .ObjectMeta - `status.sidecar.istio.io/port` 15020 ) \"0\") ]]\n readinessProbe:\n httpGet:\n - \ path: /healthz/ready\n port: [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n initialDelaySeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` - \ 1 ]]\n periodSeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` - \ 2 ]]\n failureThreshold: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` - \ 30 ]]\n [[ end -]]securityContext:\n readOnlyRootFilesystem: true\n - \ [[ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"TPROXY\" -]]\n capabilities:\n add:\n - NET_ADMIN\n runAsGroup: - 1337\n [[ else -]]\n \n runAsUser: 1337\n [[- end ]]\n resources:\n - \ [[ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset - .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -]]\n requests:\n - \ [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -]]\n - \ cpu: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` ]]\"\n - \ [[ end ]]\n [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) - -]]\n memory: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` - ]]\"\n [[ end ]]\n [[ else -]]\n limits:\n cpu: 2000m\n - \ memory: 128Mi\n requests:\n cpu: 10m\n memory: 40Mi\n - \ \n [[ end -]]\n volumeMounts:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - mountPath: /etc/istio/custom-bootstrap\n - \ name: custom-bootstrap-volume\n [[- end ]]\n - mountPath: /etc/istio/proxy\n - \ name: istio-envoy\n - mountPath: /etc/certs/\n name: istio-certs\n - \ readOnly: true\n [[- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` - ]]\n [[ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 4 ]]\n [[ - end ]]\n [[- end ]]\n volumes:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - name: custom-bootstrap-volume\n - \ configMap:\n name: [[ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` - `` ]]\n [[- end ]]\n - emptyDir:\n medium: Memory\n name: istio-envoy\n - \ - name: istio-certs\n secret:\n optional: true\n [[ if eq .Spec.ServiceAccountName - \"\" -]]\n secretName: istio.default\n [[ else -]]\n secretName: - [[ printf \"istio.%s\" .Spec.ServiceAccountName ]]\n [[ end -]]\n [[- - if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` ]]\n [[ range - $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 2 ]]\n [[ end - ]]\n [[ end ]]" -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index be0ffff1af..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - mesh: "# Set the following variable to true to disable policy checks by the Mixer.\n# - Note that metrics will still be reported to the Mixer.\ndisablePolicyChecks: false\n\n# - Set enableTracing to false to disable request tracing.\nenableTracing: true\n\n# - Set accessLogFile to empty string to disable access log.\naccessLogFile: \"/dev/stdout\"\n\n# - If accessLogEncoding is TEXT, value will be used directly as the log format\n# - example: \"[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\\n\"\n# - If AccessLogEncoding is JSON, value will be parsed as map[string]string\n# example: - '{\"start_time\": \"%START_TIME%\", \"req_method\": \"%REQ(:METHOD)%\"}'\n# Leave - empty to use default log format\naccessLogFormat: \"\"\n\n# Set accessLogEncoding - to JSON or TEXT to configure sidecar access log\naccessLogEncoding: 'TEXT'\nmixerCheckServer: - istio-policy.istio-system.svc.cluster.local:9091\nmixerReportServer: istio-telemetry.istio-system.svc.cluster.local:9091\n# - policyCheckFailOpen allows traffic in cases when the mixer policy service cannot - be reached.\n# Default is false which means the traffic is denied when the client - is unable to connect to Mixer.\npolicyCheckFailOpen: false\n# Let Pilot give ingresses - the public IP of the Istio ingressgateway\ningressService: istio-ingressgateway\n\n# - Default connect timeout for dynamic clusters generated by Pilot and returned via - XDS\nconnectTimeout: 10s\n\n# DNS refresh rate for Envoy clusters of type STRICT_DNS\ndnsRefreshRate: - 5s\n\n# Unix Domain Socket through which envoy communicates with NodeAgent SDS - to get\n# key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - \nsdsUdsPath: \n\n# This flag is used by secret discovery service(SDS). \n# If - set to true(prerequisite: https://kubernetes.io/docs/concepts/storage/volumes/#projected), - Istio will inject volumes mount \n# for k8s service account JWT, so that K8s API - server mounts k8s service account JWT to envoy container, which \n# will be used - to generate key/cert eventually. This isn't supported for non-k8s case.\nenableSdsTokenMount: - false\n\n# This flag is used by secret discovery service(SDS). \n# If set to true, - envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token' - \n# (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod) - \n# and pass to sds server, which will be used to request key/cert eventually. - \n# this flag is ignored if enableSdsTokenMount is set.\n# This isn't supported - for non-k8s case.\nsdsUseK8sSaJwt: false\n\n# The trust domain corresponds to - the trust root of a system.\n# Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain\ntrustDomain: - \n\n# Set the default behavior of the sidecar for handling outbound traffic from - the application:\n# ALLOW_ANY - outbound traffic to unknown destinations will - be allowed, in case there are no\n# services or ServiceEntries for the destination - port\n# REGISTRY_ONLY - restrict outbound traffic to services defined in the service - registry as well\n# as those defined through ServiceEntries \noutboundTrafficPolicy:\n - \ mode: ALLOW_ANY\n\nlocalityLbSetting:\n {}\n \n\n# The namespace to treat - as the administrative root namespace for istio\n# configuration. \nrootNamespace: - istio-system\nconfigSources:\n- address: istio-galley.istio-system.svc:9901\n\ndefaultConfig:\n - \ #\n # TCP connection timeout between Envoy & the application, and between Envoys. - \ Used for static clusters\n # defined in Envoy's configuration file\n connectTimeout: - 10s\n #\n ### ADVANCED SETTINGS #############\n # Where should envoy's configuration - be stored in the istio-proxy container\n configPath: \"/etc/istio/proxy\"\n binaryPath: - \"/usr/local/bin/envoy\"\n # The pseudo service name used for Envoy.\n serviceCluster: - istio-proxy\n # These settings that determine how long an old Envoy\n # process - should be kept alive after an occasional reload.\n drainDuration: 45s\n parentShutdownDuration: - 1m0s\n #\n # The mode used to redirect inbound connections to Envoy. This setting\n - \ # has no effect on outbound traffic: iptables REDIRECT is always used for\n - \ # outbound connections.\n # If \"REDIRECT\", use iptables REDIRECT to NAT and - redirect to Envoy.\n # The \"REDIRECT\" mode loses source addresses during redirection.\n - \ # If \"TPROXY\", use iptables TPROXY to redirect to Envoy.\n # The \"TPROXY\" - mode preserves both the source and destination IP\n # addresses and ports, so - that they can be used for advanced filtering\n # and manipulation.\n # The \"TPROXY\" - mode also configures the sidecar to run with the\n # CAP_NET_ADMIN capability, - which is required to use TPROXY.\n #interceptionMode: REDIRECT\n #\n # Port - where Envoy listens (on local host) for admin commands\n # You can exec into - the istio-proxy container in a pod and\n # curl the admin port (curl http://localhost:15000/) - to obtain\n # diagnostic information from Envoy. See\n # https://lyft.github.io/envoy/docs/operations/admin.html\n - \ # for more details\n proxyAdminPort: 15000\n #\n # Set concurrency to a specific - number to control the number of Proxy worker threads.\n # If set to 0 (default), - then start worker thread for each CPU thread/core.\n concurrency: 2\n #\n tracing:\n - \ zipkin:\n # Address of the Zipkin collector\n address: zipkin.istio-system:9411\n - \ #\n # Mutual TLS authentication between sidecars and istio control plane.\n - \ controlPlaneAuthPolicy: NONE\n #\n # Address where istio Pilot service is - running\n discoveryAddress: istio-pilot.istio-system:15010" - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - release: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml deleted file mode 100644 index ec52e4be53..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "istio_namespace: istio-system\nserver:\n port: 20001\nexternal_services:\n - \ istio:\n url_service_version: http://istio-pilot:8080/version\n jaeger:\n - \ url: \n grafana:\n url: \n" -kind: ConfigMap -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index 1a06e2ff6c..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,313 +0,0 @@ -apiVersion: v1 -data: - prometheus.yml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - metric_relabel_configs: - # Exclude some of the envoy metrics that have massive cardinality - # This list may need to be pruned further moving forward, as informed - # by performance and scalability testing. - - source_labels: [ cluster_name ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ tcp_prefix ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ listener_address ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_listener_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tls.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tcp_downstream.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_http_(stats|admin).*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_cluster_(lb|retry|bind|internal|max|original).*' - action: drop - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 072bd0fd7a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - istio-injection: disabled - name: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml deleted file mode 100644 index c96321c013..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - passphrase: YWRtaW4= - username: YWRtaW4= -kind: Secret -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -type: Opaque diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml deleted file mode 100644 index ddc7dbff72..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - ports: - - name: http - port: 3000 - protocol: TCP - targetPort: 3000 - selector: - app: grafana - type: ClusterIP diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 4215ecb031..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml deleted file mode 100644 index 4998a7f877..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - - name: https - port: 443 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-egressgateway - istio: egressgateway - release: istio - type: ClusterIP diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index e037f828d3..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index 5833ac81fa..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - release: istio - type: NodePort diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 20b0a6b506..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 31ff71c40b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 877561ec4a..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - port: 443 - selector: - istio: sidecar-injector diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index eebbbe6978..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml deleted file mode 100644 index 1dfd5cd653..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: agent-service - release: istio - name: jaeger-agent - namespace: istio-system -spec: - clusterIP: None - ports: - - name: agent-zipkin-thrift - port: 5775 - protocol: UDP - targetPort: 5775 - - name: agent-compact - port: 6831 - protocol: UDP - targetPort: 6831 - - name: agent-binary - port: 6832 - protocol: UDP - targetPort: 6832 - selector: - app: jaeger diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml deleted file mode 100644 index 5f4aeccfb5..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: collector-service - release: istio - name: jaeger-collector - namespace: istio-system -spec: - ports: - - name: jaeger-collector-tchannel - port: 14267 - protocol: TCP - targetPort: 14267 - - name: jaeger-collector-http - port: 14268 - protocol: TCP - targetPort: 14268 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml deleted file mode 100644 index 94a9e9d15b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: jaeger-service - release: istio - name: jaeger-query - namespace: istio-system -spec: - ports: - - name: query-http - port: 16686 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml deleted file mode 100644 index 049f4c74d7..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - ports: - - name: http-kiali - port: 20001 - protocol: TCP - selector: - app: kiali diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index f0ecb03d63..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml deleted file mode 100644 index 973e98032f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: null - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: tracing - namespace: istio-system -spec: - ports: - - name: http-query - port: 80 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml deleted file mode 100644 index 43acf02148..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: zipkin - namespace: istio-system -spec: - ports: - - name: http - port: 9411 - protocol: TCP - targetPort: 9411 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index 8cf250f0d0..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml deleted file mode 100644 index ab525f7ced..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml deleted file mode 100644 index 5581b918c1..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index adb8c1a617..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml deleted file mode 100644 index 94a0b1f0ac..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index ad9a81526f..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index c0c452e957..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index e6b9404cda..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index c844263f93..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index e40f71183b..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml deleted file mode 100644 index 6a40ec8143..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 2ad4d98808..0000000000 --- a/tests/stacks/ibm/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/ibm/application/istio/kustomize_test.go b/tests/stacks/ibm/application/istio/kustomize_test.go deleted file mode 100644 index 75fe33be3f..0000000000 --- a/tests/stacks/ibm/application/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/stacks/ibm/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 9c7e471ebc..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "OFF" diff --git a/tests/stacks/ibm/application/istio/test_data/expected/~g_v1_configmap_istio-config.yaml b/tests/stacks/ibm/application/istio/test_data/expected/~g_v1_configmap_istio-config.yaml deleted file mode 100644 index 162609e5d2..0000000000 --- a/tests/stacks/ibm/application/istio/test_data/expected/~g_v1_configmap_istio-config.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "OFF" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/kustomize_test.go b/tests/stacks/ibm/application/jupyter-web-app/base/kustomize_test.go deleted file mode 100644 index 16726854ad..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package base - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/ibm/application/jupyter-web-app/base", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 2583fa2263..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index 098ea28b6d..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/base/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/kustomize_test.go b/tests/stacks/ibm/application/jupyter-web-app/kustomize_test.go deleted file mode 100644 index 7fea301ad2..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package jupyter_web_app - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/jupyter-web-app", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 2583fa2263..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index df4b224d44..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.$(namespace).svc.$(clusterDomain) - port: - number: 80 diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index 098ea28b6d..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/ibm/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/kustomize_test.go b/tests/stacks/ibm/application/katib/kustomize_test.go deleted file mode 100644 index 88c71c0212..0000000000 --- a/tests/stacks/ibm/application/katib/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/katib", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index a40300472f..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:5.6 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/ibm/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/ibm/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/kustomize_test.go b/tests/stacks/ibm/application/kfp-argo-multi-user/kustomize_test.go deleted file mode 100644 index 0c02ad87df..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfp_argo_multi_user - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/kfp-argo-multi-user", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADMAAAAyCAYAAADx/eOPAAALuUlEQVRogd2afWxd9XnHP99bK4pS3yhiGUIRiiJUVVVqbq8ppdR20ibqpuIMtDRkUYERp29J57gMZVuxsrZiK7oZXVv5re1AiOuoG+N1DMkuytprsGPEVMouxqQZJVHEWIdQlGVxZlmZdb/747zcc869jpMO+seOdPz7nd/L83tev89zzjX8Bq795Rq9o17zXp+Tey+Ijkyboela29DRWkhffyT733pH/Z3este9F2cC6N0kNjxtjD+FdRD8UF9X7u97y7UbQFPAivC0BdllS381slun3s3z3xVhhqeds90tqR/oMB7u68z19ZZra0E/l1if3WOziPx3skrDPTr+bvDxfxImEIJbgX6gGBJ7EfHJX/ySReDHwO9KYAenyWCMFKw21GSeslwa2Z17+TcuzPBRr7B8m6Df5oOJqdPAR/u6cm/2lmv3At+IT3GiXZqbcaxSLsfRoTsvn7XL2jE87ZXGnwf+VGiDY86ETM1wU1+XjvSW/RlgTJADQ2QaCZKWcX1/aDIcjE8i3SdzZLjn0lm8pJXD02417BM+gLmq2Rqjr/d16Vu95dp6wc8Ra5O8NrPIcoZCvIR1H+KZkd2qLcfnRYUZOuorJO+3uQt0RerolGYZR7r5+C9ZATwPviGyQprd6Liszy3bnwVKwGMjPbnFyxJmeNpX2T4gaR/QmmSpyYZTho/2depMb9k/kNh3KawuJ1bWauHzUcyXRpZAv5Zmg7aHBLcmNN9ECAFeAO3s69KZ3nLtDuF9dnBs0IT9JO24rbPb0JfP2syCZpFfE5q1mRWcvlgMNcwMTRq9z/+OWXdx4AGjvX1deqC37DbwPwOrMgsufol5mWMWs1ivEbjTrOCtLNNb+udygqsNbUBtopR/NkuuwTJ6Hxsw67KSuvH5MPDA/nJttfGTdUFCMUlp/ALwOtIs9muBxpnFnBzuSQf21oP/BbXclVvumWuTaDN8WNBm2GizJkxPM0CDMA2WGZ72bbb/Njue2TRj9Il/PcG87SeBz4ZTNaSTsmctHcO8SqDp14d7dCFLZ2v/3OpQ023Ah4n65kohvETUCdcsfmuilD+bpNdgGZvOODuHqYGIVGCec9g7+7o031v2jaBTiD0ysxbHRnZrPktzyz1zK7f0z10nh5pWwLRhvZro1KqznVJhNB8UyDeSsU4zAOiIXV1OuEqQ2AR79nflXgcY6dGLwIvR8q39cy1b+uc2Emo6dI824BpMSxz8iVhy4m/2WiYHdV5UmOHp2mpwm52ESCdwRn+9v0tPAWzpn9sAFAQbMdc60PaHsFZEWd9uxk4z8G3seykECfObTEd2KmuZG4CWyLXkYLMwtiYt+hMsTUdAEZQzjs9apv66SHJRk73ZjBQ+iRu29s+1VEr5OImmXs4MHUahVoLWgK23wbv6OrU4OulcuHYehWsVHhpXwpE2FNRayTszX2cwDpQEzTB+QvrJHCXUaigk+c++aXZiE98YmUVgV19X7u3ypH/fgfUA5h2usY2jNjmWoGVn50nvC9T2NviA5OPBGPW91OlG+0Xa1WJhhqadk3WjpKCilQIQFP19XZocnfIHgIeFWyNh6goXyX6gdNWfU8aJ5tNjEheAHZVS/ruGj0s8k6VPhh6ms6kwgoLl1aGuCEuSpwXfHZ2qrTJ+HHkNCpOjmbdFcEcGUIhUSj/H65rPO6j+766U8i/QXV0z8cqJc4btwF8AtWgtMb1wj+j41Df/s1EYQwdEDiqM3hDes9quGY3IKoYOvCrU7HlCoZtEWapPkzEpsU8uq8b36a6uBqaBv5l45URLpZT/pmGH8LnkvlAdAOt1oeXqRsuYTjlEMJiXvWN/Z+5szfqioKcOKo7qr/nAEesKiOyv2A/q88rOx8+8bPhK5dUTAA8jbUT6MuKnbKteNVHKP23xCeD1LC0F2TWOmzoAKEiWxmC+sr8rN1OerF2HGaqXFcZhDWaYj11S4ZxcXxVqyKqPZOeNTwM7Jkr5BeDPQJ8NFQaoC/gZ26rXT5TyxxAfRx6P94d0gU0pYYama+tsbwix/AHM4fKUrwAeB68kRJ5AZsWWieGTjLipsVCgrKCwKHF7pZQ/RXf104j76i4ZMmquxkzRXb2zUsqfxdxsfCiA70hRjZbpCDHmJcRdeZPDHkVck0Ul5PeHZ81DgHxKtglXaHCxVN9fr5TyR9hW3QA8Amqp5526SyKtBEbZVv1eZeZkbqKU7xfsFJwPqRW29s+11oUxnUhnkHf2dWoB+R5Jv5dNaGHh1wog8d/ZAI+0GgVpFPTp4AfJT2Hup7u6EvMk0tpkboutEz0HMPzHyD+mu3pFpZR/Aug0Pgm0RLkvFzLWYfjDvs7cqfKUt2LuXTLhue5mdWhVDJdEzxDDcRKawceN9lRePVkDfgBcR/LKVqNpz/s08DO6q4VKKT8j8zHgJ1HyzA1P11YZjfV1arw85auBR4RalDB5lEjDKi0CgPPphKZ0QiNRwUQeg88B2ydKreew9yH1NCxe/r4GaZpt1Vsrh/JnDDcBLwPkbLVgf6s86RXYj4KvtJKJM8KsGLkSlsmUL6mSg1RJY1xD7KmU8sfprnYgBqJsGVsiEfupsca7FfMo26p/OfHKiVqllB8HyPV16VxfV66G/G1QBwY5xvCgTT7X3/MTaBbFVr0fJvqw2ASZ+yul/FN0V68CHsesiDl3UopM3CwhDZDD/Dnwj3S/sjoYAMqTtc1YX02jVqYOiuuqsAKIkqZCfFIz/IrfFY8gDrKt2gI8irSuwQezyTeNaOl+6qYb+fpYGKEXJE9GSTObK5ItrheaLHE5/XRKcHul+kYN8x2kzWlLNNuVtUqibzKW5CBjxUoszO7NWrS1E/xWvMeJjck2WQHEKJeMD+qH4gWCSvg00m3AVxv5TMRKsp9Cs0Q/Ka/1BOZQNBSXMz2b9Q5oO9JCKgkqg2aKofl8uvTPeE1w3t5KKf8y26pFxINhLRa5R9JV6huT/aZuFu7Ds+A9jBdj+VIvZz2b9BL2Xi5yJQEgUFqinI9SZBDx358o5Q/HiRGtquOEmxJu6DcbC/afQWxnvHg+Odrwm2bP5txh5OEYjOM3vaiu8qqHJw1mPmK/Xs7HJf0LRncDMF5cAL6NWUxDrX/duwbczljxjSzvTX+gtXU3MBlrRCltrsxBTgorACKrRGf5bczOiVLrhUL74B2F9oHVjBd/iLwTWEhr+CIWaLYumDjIWLHha+aSwvRs1iJmJ9Kb9ZJRETS3ACsMC8i1ZNwgXZDYWTmU/1WhfeAW8Cjo+UL7wDrGik8jfid0kYz/Z2ODepv+GPIY+FAznpcUJhAo9w5mh81CFtEsWieCTzwXkogmfKBSyh8ttA98EDPqoPouYqYLxYEPMVY8itmEeTM+KEaqZhVAkiPPIL6QDPhLFiYQSC9J7M3mGlF/24zWSvwIM1xoH2gF/sFiTcSPxQakqUJxsIPx4jGCr0AzCUYTbROJ7DPAdsbSAX9ZwgDs3qTDiMGUOxF/1DgfekLVsPf0sw8DPARsDNwy8iYBXov4p0L7wC2MF99CfBJ4rqmbJbO/qYE+x1jx5HK8Xtp/aFgHDM/FX+RM9FFjHjjj4NV3HvlPsP4g+SqQgm6zCuvJQnHgi4wVz2JuAj8RnLGEVaCf8Y8cuRQ2L0mYEBB2Gb8ZHKD4NQBx+0Qpf7LQPrAVVGqiiWTpCcEn4QcLxcF7C7+aXMDahT1YX5IS5DHE/ZfC4yULEwr0DtIOWwuuvwZ8rVLKP1soDqzHPGJoyRao9b4SXiQQ30A8eO1/PJ8D7gK+BtQSJcQM8AXGlg747LUkmi91lad8J3CuZ5OeBii0D64ET2FdH1N0omWJvgLPkvwM8LmZf7lrnm3VO4CHsM4DH2P8I8vGSfK67P9q8v9wWPAcQLH4PbBHbK6Pq+3M9+Ml+6FL2dyC+WmhOLiWseKPMDeDd12uIPBrWCZ5Xds++AHsAwGlBKnoB5747c2J+aSJEuvRL8CDv/2Zz+cqh/LL/gPD//vrfwFjcI5oX6jDBwAAAABJRU5ErkJggg== - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index dd97d1e4d3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pv-claim diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 59d87d4e67..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index b82271798a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml deleted file mode 100644 index b2cd7cdbe4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPvcName: minio-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml deleted file mode 100644 index 7d9e9da8fb..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPvcName: mysql-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml deleted file mode 100644 index e1792aa3a0..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/kustomize_test.go b/tests/stacks/ibm/application/kfp-argo/kustomize_test.go deleted file mode 100644 index 0018753f61..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfp_argo - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/kfp-argo", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 77004306de..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index dd97d1e4d3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pv-claim diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 3d8cd5347c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d395adaed4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1a60f06ce5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 1fb43d9089..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml deleted file mode 100644 index b2cd7cdbe4..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPvcName: minio-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml deleted file mode 100644 index 7d9e9da8fb..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPvcName: mysql-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml deleted file mode 100644 index e1792aa3a0..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/application/kfp-argo/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/kustomize_test.go b/tests/stacks/ibm/application/kfp-tekton-multi-user/kustomize_test.go deleted file mode 100644 index 58f326cb63..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfp_tekton_multi_user - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/kfp-tekton-multi-user", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index 009d76e696..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-gg2h6k2fch - name: hooks diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index a2243b9ec9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: NAMESPACE_TO_WATCH - value: "" - image: docker.io/aipipeline/metadata-writer:0.4.0 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index dd97d1e4d3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pv-claim diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index b35938fe35..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: docker.io/aipipeline/persistenceagent:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 2af2c46654..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: docker.io/aipipeline/scheduledworkflow:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 91ab49d5ce..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: docker.io/aipipeline/frontend:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index b7d8ae85ff..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,161 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARTIFACT_BUCKET - valueFrom: - configMapKeyRef: - key: artifact_bucket - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT - valueFrom: - configMapKeyRef: - key: artifact_endpoint - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT_SCHEME - valueFrom: - configMapKeyRef: - key: artifact_endpoint_scheme - name: kfp-tekton-config - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: TRACK_ARTIFACTS - valueFrom: - configMapKeyRef: - key: track_artifacts - name: kfp-tekton-config - - name: STRIP_EOF - valueFrom: - configMapKeyRef: - key: strip_eof - name: kfp-tekton-config - - name: ARTIFACT_SCRIPT - valueFrom: - configMapKeyRef: - key: artifact_script - name: kfp-tekton-config - - name: ARTIFACT_IMAGE - valueFrom: - configMapKeyRef: - key: artifact_image - name: kfp-tekton-config - - name: INJECT_DEFAULT_SCRIPT - valueFrom: - configMapKeyRef: - key: inject_default_script - name: kfp-tekton-config - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: docker.io/aipipeline/api-server:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index 70678cc148..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8036a41555..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index db407f5818..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 3f998fe349..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index 6945d0b189..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get - - delete -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml deleted file mode 100644 index 0e53393a62..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -data: - archive_logs: "false" - artifact_bucket: mlpipeline - artifact_endpoint: minio-service.kubeflow:9000 - artifact_endpoint_scheme: http:// - artifact_image: minio/mc:RELEASE.2020-11-25T23-04-07Z - artifact_script: |- - #!/usr/bin/env sh - push_artifact() { - tar -cvzf $1.tgz $2 - mc cp $1.tgz storage/$ARTIFACT_BUCKET/artifacts/$PIPELINERUN/$PIPELINETASK/$1.tgz - } - push_log() { - cat /var/log/containers/$PODNAME*$NAMESPACE*step-main*.log > step-main.log - push_artifact main-log step-main.log - } - strip_eof() { - awk 'NF' $2 | head -c -1 > $1_temp_save && cp $1_temp_save $2 - } - mc config host add storage ${ARTIFACT_ENDPOINT_SCHEME}${ARTIFACT_ENDPOINT} $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY - inject_default_script: "true" - strip_eof: "false" - track_artifacts: "true" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kfp-tekton-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-gg2h6k2fch.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-gg2h6k2fch.yaml deleted file mode 100644 index 2eccebede9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-gg2h6k2fch.yaml +++ /dev/null @@ -1,325 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["ServiceRole.rbac.istio.io/v1alpha1"]) == 1 and \ - len(children["ServiceRoleBinding.rbac.istio.io/v1alpha1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "rbac.istio.io/v1alpha1", - "kind": "ServiceRole", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "rules": [{ - "services": ["ml-pipeline-visualizationserver.*"] - }] - } - }, - { - "apiVersion": "rbac.istio.io/v1alpha1", - "kind": "ServiceRoleBinding", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "subjects": [{ - "properties": { - "source.principal": - "cluster.local/ns/kubeflow/sa/ml-pipeline" - } - }], - "roleRef": { - "kind": "ServiceRole", - "name": "ml-pipeline-visualizationserver" - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - { - "apiVersion": "tekton.dev/v1alpha1", - "kind": "Condition", - "metadata": { - "name": "super-condition", - "namespace": namespace, - }, - "spec": { - "check": { - "image": "python:alpine3.6", - "script": ("python -c 'import sys\ninput1=str.rstrip(sys.argv[1])\n" - "input2=str.rstrip(sys.argv[2])\ntry:\n input1=int(input1)\n" - " input2=int(input2)\nexcept:\n input1=str(input1)\nsys.exit(0)" - " if (input1 $(params.operator) input2) else sys.exit(1)' " - "'$(params.operand1)' '$(params.operand2)'") - }, - "params": [ - { - "name": "operand1", - "type": "string" - }, - { - "name": "operand2", - "type": "string" - }, - { - "name": "operator", - "type": "string" - } - ] - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - annotations: {} - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-gg2h6k2fch - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml deleted file mode 100644 index b2cd7cdbe4..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPvcName: minio-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml deleted file mode 100644 index 7d9e9da8fb..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPvcName: mysql-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml deleted file mode 100644 index e1792aa3a0..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton-multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/kustomize_test.go b/tests/stacks/ibm/application/kfp-tekton/kustomize_test.go deleted file mode 100644 index 3f5946aaa3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfp_tekton - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/kfp-tekton", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 786c0ae404..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/aipipeline/metadata-writer:0.4.0 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 93df16584c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index f37eaea8a5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: docker.io/aipipeline/persistenceagent:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 228b995fd5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/aipipeline/scheduledworkflow:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index dd5d721ed2..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: docker.io/aipipeline/frontend:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index a60cac492e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,148 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARTIFACT_BUCKET - valueFrom: - configMapKeyRef: - key: artifact_bucket - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT - valueFrom: - configMapKeyRef: - key: artifact_endpoint - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT_SCHEME - valueFrom: - configMapKeyRef: - key: artifact_endpoint_scheme - name: kfp-tekton-config - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: TRACK_ARTIFACTS - valueFrom: - configMapKeyRef: - key: track_artifacts - name: kfp-tekton-config - - name: STRIP_EOF - valueFrom: - configMapKeyRef: - key: strip_eof - name: kfp-tekton-config - - name: ARTIFACT_SCRIPT - valueFrom: - configMapKeyRef: - key: artifact_script - name: kfp-tekton-config - - name: ARTIFACT_IMAGE - valueFrom: - configMapKeyRef: - key: artifact_image - name: kfp-tekton-config - - name: INJECT_DEFAULT_SCRIPT - valueFrom: - configMapKeyRef: - key: inject_default_script - name: kfp-tekton-config - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: docker.io/aipipeline/api-server:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index 8ec616b644..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index dad84d711b..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 51363258a5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index 70f0efca82..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index c886c87d76..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index f049311840..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index 0023a8baa7..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml deleted file mode 100644 index 932a873101..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: tekton.dev/v1alpha1 -kind: Condition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: super-condition - namespace: kubeflow -spec: - check: - image: python:alpine3.6 - script: |- - python -c 'import sys - input1=str.rstrip(sys.argv[1]) - input2=str.rstrip(sys.argv[2]) - try: - input1=int(input1) - input2=int(input2) - except: - input1=str(input1) - sys.exit(0) if (input1 $(params.operator) input2) else sys.exit(1)' '$(params.operand1)' '$(params.operand2)' - params: - - name: operand1 - - name: operand2 - - name: operator diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml deleted file mode 100644 index 0e53393a62..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -data: - archive_logs: "false" - artifact_bucket: mlpipeline - artifact_endpoint: minio-service.kubeflow:9000 - artifact_endpoint_scheme: http:// - artifact_image: minio/mc:RELEASE.2020-11-25T23-04-07Z - artifact_script: |- - #!/usr/bin/env sh - push_artifact() { - tar -cvzf $1.tgz $2 - mc cp $1.tgz storage/$ARTIFACT_BUCKET/artifacts/$PIPELINERUN/$PIPELINETASK/$1.tgz - } - push_log() { - cat /var/log/containers/$PODNAME*$NAMESPACE*step-main*.log > step-main.log - push_artifact main-log step-main.log - } - strip_eof() { - awk 'NF' $2 | head -c -1 > $1_temp_save && cp $1_temp_save $2 - } - mc config host add storage ${ARTIFACT_ENDPOINT_SCHEME}${ARTIFACT_ENDPOINT} $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY - inject_default_script: "true" - strip_eof: "false" - track_artifacts: "true" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kfp-tekton-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 2820e03a28..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index 9e7ca8b1a1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 8c182135e1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index 3ab48a4f5f..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index d9eaa27473..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/application/metadata/kustomize_test.go b/tests/stacks/ibm/application/metadata/kustomize_test.go deleted file mode 100644 index d0b22fce2c..0000000000 --- a/tests/stacks/ibm/application/metadata/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package metadata - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/metadata", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml deleted file mode 100644 index 96083e85b3..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - descriptor: - description: Tracking and managing metadata of machine learning workflows in Kubeflow. - keywords: - - metadata - links: - - description: Docs - url: https://www.kubeflow.org/docs/components/misc/metadata/ - maintainers: - - email: zhenghui@google.com - name: Zhenghui Wang - owners: - - email: ajaygopinathan@google.com - name: Ajay Gopinathan - - email: zhenghui@google.com - name: Zhenghui Wang - type: metadata - version: alpha - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 07772c27d5..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:5.6 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 318cb9dca7..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 19a8c7af54..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index b26c52c9c7..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index a208618c6e..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index ceb1d41db7..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index d3c9bb36c4..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index 4712d44a46..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index 40d6ad36e4..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 0f332f2bc2..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index 7bf24ae247..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 882bac7aae..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a1ace55ddd..0000000000 --- a/tests/stacks/ibm/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/application/notebook-controller/base/kustomize_test.go b/tests/stacks/ibm/application/notebook-controller/base/kustomize_test.go deleted file mode 100644 index 9ff6339ab2..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package base - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/ibm/application/notebook-controller/base", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 2009ccb90f..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 50bbb9ad73..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-config - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-config - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 41459ef302..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index 3ae0c1cd8e..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 9e28e08290..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 02d880f8e2..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 30d3f08b7e..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml deleted file mode 100644 index a4144c9bb3..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index a9f1b4b8e0..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index d34df92177..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/base/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebook-controller/kustomize_test.go b/tests/stacks/ibm/application/notebook-controller/kustomize_test.go deleted file mode 100644 index 0af784f859..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package notebook_controller - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/notebook-controller", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 2009ccb90f..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/default_app.k8s.io_v1beta1_application_notebook-controller.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/default_app.k8s.io_v1beta1_application_notebook-controller.yaml deleted file mode 100644 index d3a8af040f..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/default_app.k8s.io_v1beta1_application_notebook-controller.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - name: notebook-controller -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 50bbb9ad73..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-config - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-config - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_configmap_notebook-controller-config.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_configmap_notebook-controller-config.yaml deleted file mode 100644 index a4144c9bb3..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_configmap_notebook-controller-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_service_notebook-controller-service.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index a9f1b4b8e0..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index d34df92177..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/kubeflow_~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 41459ef302..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index 3ae0c1cd8e..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 9e28e08290..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 02d880f8e2..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 30d3f08b7e..0000000000 --- a/tests/stacks/ibm/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/kustomize_test.go b/tests/stacks/ibm/application/notebooks/kustomize_test.go deleted file mode 100644 index 5df31e1e99..0000000000 --- a/tests/stacks/ibm/application/notebooks/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package notebooks - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/notebooks", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 2009ccb90f..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml deleted file mode 100644 index a596606ba5..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - name: notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index ff7d0f4db5..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 50bbb9ad73..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-config - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-config - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index 0a002320c4..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 41459ef302..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index 3ae0c1cd8e..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 9e28e08290..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 02d880f8e2..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 30d3f08b7e..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml deleted file mode 100644 index a4144c9bb3..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index f70426fc0f..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.kubeflow - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index a9f1b4b8e0..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index d34df92177..0000000000 --- a/tests/stacks/ibm/application/notebooks/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/kustomize_test.go b/tests/stacks/ibm/application/oidc-authservice-appid/kustomize_test.go deleted file mode 100644 index 427c2a501e..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package oidc_authservice_appid - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/oidc-authservice-appid", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/apps_v1_statefulset_authservice.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/apps_v1_statefulset_authservice.yaml deleted file mode 100644 index 7723869794..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/apps_v1_statefulset_authservice.yaml +++ /dev/null @@ -1,83 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - serviceName: authservice - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - spec: - containers: - - env: - - name: USERID_HEADER - value: kubeflow-userid - - name: USERID_PREFIX - value: "" - - name: USERID_CLAIM - value: email - - name: OIDC_PROVIDER - valueFrom: - secretKeyRef: - key: oAuthServerUrl - name: appid-application-configuration - - name: OIDC_AUTH_URL - value: "" - - name: OIDC_SCOPES - value: profile email groups - - name: REDIRECT_URL - valueFrom: - secretKeyRef: - key: oidcRedirectUrl - name: appid-application-configuration - - name: SKIP_AUTH_URI - value: "" - - name: PORT - value: "8080" - - name: CLIENT_ID - valueFrom: - secretKeyRef: - key: clientId - name: appid-application-configuration - - name: CLIENT_SECRET - valueFrom: - secretKeyRef: - key: secret - name: appid-application-configuration - - name: STORE_PATH - value: /var/lib/authservice/data.db - image: gcr.io/arrikto/kubeflow/oidc-authservice:28c59ef - imagePullPolicy: Always - name: authservice - ports: - - containerPort: 8080 - name: http-api - readinessProbe: - httpGet: - path: / - port: 8081 - volumeMounts: - - mountPath: /var/lib/authservice - name: data - securityContext: - fsGroup: 111 - serviceAccountName: oidc-authservice-service-account - volumes: - - name: data - persistentVolumeClaim: - claimName: authservice-pvc diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml deleted file mode 100644 index 510e1df10f..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authn-filter - namespace: istio-system -spec: - filters: - - filterConfig: - httpService: - authorizationRequest: - allowedHeaders: - patterns: - - exact: cookie - - exact: X-Auth-Token - authorizationResponse: - allowedUpstreamHeaders: - patterns: - - exact: kubeflow-userid - serverUri: - cluster: outbound|8080||authservice.istio-system.svc.cluster.local - failureModeAllow: false - timeout: 10s - uri: http://authservice.istio-system.svc.cluster.local - statusOnError: - code: GatewayTimeout - filterName: envoy.ext_authz - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - istio: ingressgateway diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_virtualservice_authservice.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_virtualservice_authservice.yaml deleted file mode 100644 index c4c9ab2b27..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/networking.istio.io_v1alpha3_virtualservice_authservice.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - gateways: - - kubeflow/kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /login - route: - - destination: - host: authservice.istio-system.svc.cluster.local - port: - number: 8080 diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml deleted file mode 100644 index ac5e3e1250..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: ldapdexapp - gatewaySelector: ingressgateway - namespace: istio-system - oidc_auth_url: "" - oidc_provider: "" - oidc_redirect_uri: "" - skip_auth_uri: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice-parameters - namespace: istio-system diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml deleted file mode 100644 index 7496a46ef8..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice-pvc - namespace: istio-system -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_service_authservice.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_service_authservice.yaml deleted file mode 100644 index 0884d424a4..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_service_authservice.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - ports: - - name: http-authservice - port: 8080 - targetPort: http-api - publishNotReadyAddresses: true - selector: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - type: ClusterIP diff --git a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_serviceaccount_oidc-authservice-service-account.yaml b/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_serviceaccount_oidc-authservice-service-account.yaml deleted file mode 100644 index 4aba6b89df..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice-appid/test_data/expected/~g_v1_serviceaccount_oidc-authservice-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice-service-account - namespace: istio-system diff --git a/tests/stacks/ibm/application/oidc-authservice/kustomize_test.go b/tests/stacks/ibm/application/oidc-authservice/kustomize_test.go deleted file mode 100644 index 1e02db974e..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package oidc_authservice - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/oidc-authservice", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml deleted file mode 100644 index 1f1236985c..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - name: oidc-authservice - namespace: istio-system -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: PersistentVolumeClaim - - group: networking.istio.io - kind: EnvoyFilter - descriptor: - description: Provides OIDC-based authentication for Kubeflow Applications, at - the Istio Gateway. - keywords: - - oidc - - authservice - - authentication - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/oidc-authservice - - description: Docs - url: https://www.kubeflow.org/docs/started/k8s/kfctl-existing-arrikto - maintainers: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - owners: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - type: oidc-authservice - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/instance: oidc-authservice-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: oidc-authservice - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml deleted file mode 100644 index 030589726f..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml +++ /dev/null @@ -1,74 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - name: authservice - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: authservice - serviceName: authservice - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: authservice - spec: - containers: - - env: - - name: USERID_HEADER - value: kubeflow-userid - - name: USERID_PREFIX - value: "" - - name: USERID_CLAIM - value: email - - name: OIDC_PROVIDER - value: http://dex.auth.svc.cluster.local:5556/dex - - name: OIDC_AUTH_URL - value: /dex/auth - - name: OIDC_SCOPES - value: profile email groups - - name: REDIRECT_URL - value: /login/oidc - - name: SKIP_AUTH_URI - value: /dex - - name: PORT - value: "8080" - - name: CLIENT_ID - value: kubeflow-oidc-authservice - - name: CLIENT_SECRET - value: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - - name: STORE_PATH - value: /var/lib/authservice/data.db - image: gcr.io/arrikto/kubeflow/oidc-authservice:28c59ef - imagePullPolicy: Always - name: authservice - ports: - - containerPort: 8080 - name: http-api - readinessProbe: - httpGet: - path: / - port: 8081 - volumeMounts: - - mountPath: /var/lib/authservice - name: data - initContainers: - - args: - - chmod -R 777 /var/lib/authservice; - command: - - sh - - -c - image: busybox:latest - name: fix-permission - volumeMounts: - - mountPath: /var/lib/authservice - name: data - securityContext: - fsGroup: 111 - volumes: - - name: data - persistentVolumeClaim: - claimName: authservice-pvc diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml deleted file mode 100644 index 3084c0f9a4..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - name: authn-filter - namespace: istio-system -spec: - filters: - - filterConfig: - httpService: - authorizationRequest: - allowedHeaders: - patterns: - - exact: cookie - - exact: X-Auth-Token - authorizationResponse: - allowedUpstreamHeaders: - patterns: - - exact: kubeflow-userid - serverUri: - cluster: outbound|8080||authservice.istio-system.svc.cluster.local - failureModeAllow: false - timeout: 10s - uri: http://authservice.istio-system.svc.cluster.local - statusOnError: - code: GatewayTimeout - filterName: envoy.ext_authz - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - istio: $(gatewaySelector) diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-config.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-config.yaml deleted file mode 100644 index 16d10d0c5b..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-config.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - gatewaySelector: ingressgateway - namespace: istio-system - oidc_auth_url: /dex/auth - oidc_provider: http://dex.auth.svc.cluster.local:5556/dex - oidc_redirect_uri: /login/oidc - skip_auth_uri: /dex - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: oidc-authservice-config - namespace: istio-system diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml deleted file mode 100644 index 1951fa7af3..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: authservice-pvc - namespace: istio-system -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml b/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml deleted file mode 100644 index 867a2023a6..0000000000 --- a/tests/stacks/ibm/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: authservice - namespace: istio-system -spec: - ports: - - name: http-authservice - port: 8080 - targetPort: http-api - publishNotReadyAddresses: true - selector: - app: authservice - type: ClusterIP diff --git a/tests/stacks/ibm/application/profile-control-plane/kustomize_test.go b/tests/stacks/ibm/application/profile-control-plane/kustomize_test.go deleted file mode 100644 index 934cefc1e6..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package profile_control_plane - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/profile-control-plane", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index 5c7023cb1c..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,160 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml deleted file mode 100644 index 5a26ca5215..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 71f6f46961..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index aba488a718..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml deleted file mode 100644 index 549822217a..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 6422f03436..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml deleted file mode 100644 index 025efc06a4..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - admin: example@kubeflow.org - gcp-sa: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-profiles-config-h7dck95hm2 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index 84f28c4472..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 6b8e8f370b..0000000000 --- a/tests/stacks/ibm/application/profile-control-plane/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/application/profiles/base/kustomize_test.go b/tests/stacks/ibm/application/profiles/base/kustomize_test.go deleted file mode 100644 index 1352ae5036..0000000000 --- a/tests/stacks/ibm/application/profiles/base/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package base - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/ibm/application/profiles/base", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 91ef6cc7b0..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: [] - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: [] - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 2c1655364c..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index c5ce8d5701..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index 8ba4c1e03d..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 931e09da94..0000000000 --- a/tests/stacks/ibm/application/profiles/base/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profiles/kustomize_test.go b/tests/stacks/ibm/application/profiles/kustomize_test.go deleted file mode 100644 index d1b349e78e..0000000000 --- a/tests/stacks/ibm/application/profiles/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package profiles - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/profiles", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index 5c7023cb1c..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,160 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml deleted file mode 100644 index 5ae828c35b..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: profiles -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 7ee6bece98..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-deployment -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - spec: - containers: - - args: [] - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: [] - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml deleted file mode 100644 index 69dd58ef29..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: kfam -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.$(namespace).svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 6d35b6c9c7..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index 36882cc612..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index 62f471588e..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-kfam -spec: - ports: - - port: 8081 - selector: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles diff --git a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 28247f5e1f..0000000000 --- a/tests/stacks/ibm/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-controller-service-account diff --git a/tests/stacks/ibm/application/pytorch-job/kustomize_test.go b/tests/stacks/ibm/application/pytorch-job/kustomize_test.go deleted file mode 100644 index c297142723..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pytorch_job - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/pytorch-job", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/ibm/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/kustomize_test.go b/tests/stacks/ibm/application/seldon-core-operator/kustomize_test.go deleted file mode 100644 index 5c03485881..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package seldon_core_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/seldon-core-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d75200e308..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 9fee938c58..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 8069350e8c..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 8625b1f0ae..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/ibm/application/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spark-operator/kustomize_test.go b/tests/stacks/ibm/application/spark-operator/kustomize_test.go deleted file mode 100644 index 7d14618bfe..0000000000 --- a/tests/stacks/ibm/application/spark-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spark_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/spark-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index ddd151fa47..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2550 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: scheduledsparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: ScheduledSparkApplication - listKind: ScheduledSparkApplicationList - plural: scheduledsparkapplications - shortNames: - - scheduledsparkapp - singular: scheduledsparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - concurrencyPolicy: - type: string - failedRunHistoryLimit: - format: int32 - type: integer - schedule: - type: string - successfulRunHistoryLimit: - format: int32 - type: integer - suspend: - type: boolean - template: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - schedule - - template - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index bf9aacd2ff..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2532 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: sparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: SparkApplication - listKind: SparkApplicationList - plural: sparkapplications - shortNames: - - sparkapp - singular: sparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml deleted file mode 100644 index 47bbe36a1d..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - name: spark-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: SparkOperator - descriptor: - description: Spark-operator allows users to create and manage the "SparkApplication" - custom resource. - keywords: - - spark - maintainers: - - email: holden@pigscanfly.ca - name: Holden Karau - owners: - - email: holden@pigscanfly.ca - name: Holden Karau - type: spark-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: sppark-operator - app.kubernetes.io/instance: spark-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml deleted file mode 100644 index 8f9cf52035..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - strategy: - type: Recreate - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "10254" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - spec: - containers: - - args: - - -v=2 - - -namespace= - - -ingress-url-format= - - -controller-threads=10 - - -resync-interval=30 - - -logtostderr - - -enable-metrics=true - - -metrics-labels=app_type - - -metrics-port=10254 - - -metrics-endpoint=/metrics - - -metrics-prefix= - image: gcr.io/spark-operator/spark-operator:v1beta2-1.1.0-2.4.5 - imagePullPolicy: IfNotPresent - name: sparkoperator - ports: - - containerPort: 10254 - serviceAccountName: spark-operatoroperator-sa diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml deleted file mode 100644 index 8f7eabad51..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-cr -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - '*' -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - create - - get - - delete - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - create - - get - - delete -- apiGroups: - - "" - resources: - - nodes - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - create - - update - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get - - update - - delete -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - get - - update - - delete -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - - scheduledsparkapplications - - sparkapplications/status - - scheduledsparkapplications/status - verbs: - - '*' diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml deleted file mode 100644 index 7b3d77da27..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator-crb -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spark-operatoroperator-cr -subjects: -- kind: ServiceAccount - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml deleted file mode 100644 index e4a3af18c1..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml deleted file mode 100644 index ed9bb0d46e..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: spark-operatorspark-role -subjects: -- kind: ServiceAccount - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml deleted file mode 100644 index b089a63b4c..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml b/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml deleted file mode 100644 index eb83084001..0000000000 --- a/tests/stacks/ibm/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spartakus/kustomize_test.go b/tests/stacks/ibm/application/spartakus/kustomize_test.go deleted file mode 100644 index ff8fdb8f2c..0000000000 --- a/tests/stacks/ibm/application/spartakus/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spartakus - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/spartakus", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 531fe0dac7..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 6a4c558264..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index f2e0bb974d..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index 9cad7bb143..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index 8572b43906..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - usageId: -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index be719e7753..0000000000 --- a/tests/stacks/ibm/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/ibm/application/tf-job/kustomize_test.go b/tests/stacks/ibm/application/tf-job/kustomize_test.go deleted file mode 100644 index 2b3e49ce7f..0000000000 --- a/tests/stacks/ibm/application/tf-job/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package tf_job - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/ibm/application/tf-job", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index 2c4a11fcc5..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/ibm/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/base/kustomize_test.go b/tests/stacks/ibm/base/kustomize_test.go deleted file mode 100644 index e8697b3f46..0000000000 --- a/tests/stacks/ibm/base/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package base - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../stacks/ibm/base", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/base/test_data/expected/~g_v1_configmap_kubeflow-config-d7dttg89h2.yaml b/tests/stacks/ibm/base/test_data/expected/~g_v1_configmap_kubeflow-config-d7dttg89h2.yaml deleted file mode 100644 index e37cc3dac4..0000000000 --- a/tests/stacks/ibm/base/test_data/expected/~g_v1_configmap_kubeflow-config-d7dttg89h2.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-d7dttg89h2 - namespace: kubeflow diff --git a/tests/stacks/ibm/kustomize_test.go b/tests/stacks/ibm/kustomize_test.go deleted file mode 100644 index c6e3743c5c..0000000000 --- a/tests/stacks/ibm/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package ibm - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/ibm", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/multi-user/kustomize_test.go b/tests/stacks/ibm/multi-user/kustomize_test.go deleted file mode 100644 index 09eda1f9d4..0000000000 --- a/tests/stacks/ibm/multi-user/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package multi_user - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../stacks/ibm/multi-user", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d75200e308..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 9fee938c58..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 2009ccb90f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index 5c7023cb1c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,160 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml deleted file mode 100644 index 96083e85b3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - descriptor: - description: Tracking and managing metadata of machine learning workflows in Kubeflow. - keywords: - - metadata - links: - - description: Docs - url: https://www.kubeflow.org/docs/components/misc/metadata/ - maintainers: - - email: zhenghui@google.com - name: Zhenghui Wang - owners: - - email: ajaygopinathan@google.com - name: Ajay Gopinathan - - email: zhenghui@google.com - name: Zhenghui Wang - type: metadata - version: alpha - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml deleted file mode 100644 index a596606ba5..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - name: notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml deleted file mode 100644 index 5a26ca5215..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 71f6f46961..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index ff7d0f4db5..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index a40300472f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:5.6 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 07772c27d5..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:5.6 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 318cb9dca7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 19a8c7af54..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index dd97d1e4d3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pv-claim diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 59d87d4e67..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index b82271798a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 50bbb9ad73..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-config - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-config - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index aba488a718..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 8069350e8c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/ibm/multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index 0a002320c4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml deleted file mode 100644 index 549822217a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index b26c52c9c7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 41459ef302..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index 3ae0c1cd8e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 9e28e08290..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 02d880f8e2..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 30d3f08b7e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 6422f03436..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index a208618c6e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index ceb1d41db7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index d3c9bb36c4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index 4712d44a46..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml deleted file mode 100644 index a4144c9bb3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-config - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml deleted file mode 100644 index b2cd7cdbe4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPvcName: minio-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml deleted file mode 100644 index 7d9e9da8fb..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPvcName: mysql-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml deleted file mode 100644 index 025efc06a4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - admin: example@kubeflow.org - gcp-sa: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-profiles-config-h7dck95hm2 - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 025357f80b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: pns, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index a3eff61112..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: pns - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index 40d6ad36e4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml deleted file mode 100644 index e1792aa3a0..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 0f332f2bc2..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index b66a91c282..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.kubeflow - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index f70426fc0f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.kubeflow - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index 7bf24ae247..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 882bac7aae..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a1ace55ddd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index a9f1b4b8e0..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index 84f28c4472..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 8625b1f0ae..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index d34df92177..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 6b8e8f370b..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/ibm/multi-user/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d75200e308..0000000000 --- a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 9fee938c58..0000000000 --- a/tests/stacks/ibm/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 2009ccb90f..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index 5c7023cb1c..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,160 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/ibm/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 6aecb8baba..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml deleted file mode 100644 index 96083e85b3..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - descriptor: - description: Tracking and managing metadata of machine learning workflows in Kubeflow. - keywords: - - metadata - links: - - description: Docs - url: https://www.kubeflow.org/docs/components/misc/metadata/ - maintainers: - - email: zhenghui@google.com - name: Zhenghui Wang - owners: - - email: ajaygopinathan@google.com - name: Ajay Gopinathan - - email: zhenghui@google.com - name: Zhenghui Wang - type: metadata - version: alpha - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml deleted file mode 100644 index a596606ba5..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - name: notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml deleted file mode 100644 index 5a26ca5215..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/ibm/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 71f6f46961..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index ff7d0f4db5..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index a40300472f..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:5.6 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 07772c27d5..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:5.6 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 318cb9dca7..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 19a8c7af54..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 77004306de..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index dd97d1e4d3..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pv-claim diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 3d8cd5347c..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d395adaed4..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1a60f06ce5..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 1fb43d9089..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 50bbb9ad73..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-config - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-config - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index aba488a718..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-bk4bc7m928 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-bk4bc7m928 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-h7dck95hm2 - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 8069350e8c..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/ibm/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/ibm/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/ibm/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index 0a002320c4..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml deleted file mode 100644 index 549822217a..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - name: kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index b26c52c9c7..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/ibm/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 0c0539fd4b..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 7372f11b74..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 6e3413fe9a..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 7efa2fe3c1..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 41459ef302..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index 3ae0c1cd8e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 9e28e08290..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 02d880f8e2..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index c5aa988709..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 30d3f08b7e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 6422f03436..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 569a985b15..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 4bf3335ba0..0000000000 --- a/tests/stacks/ibm/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index ade4339387..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,198 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index e089825a84..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - policy: Always - prefix: jupyter -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml deleted file mode 100644 index a208618c6e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_kubeflow-config-bk4bc7m928.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: kubeflow-config-bk4bc7m928 - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index ceb1d41db7..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index d3c9bb36c4..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index 4712d44a46..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml deleted file mode 100644 index a4144c9bb3..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_notebook-controller-config.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-config - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml deleted file mode 100644 index b2cd7cdbe4..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-minio-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - minioPvcName: minio-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: pipeline-minio-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml deleted file mode 100644 index 7d9e9da8fb..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-mysql-parameters.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - mysqlPvcName: mysql-pv-claim -kind: ConfigMap -metadata: - annotations: {} - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: pipeline-mysql-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml deleted file mode 100644 index 025efc06a4..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_profiles-profiles-config-h7dck95hm2.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - admin: example@kubeflow.org - gcp-sa: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-profiles-config-h7dck95hm2 - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 025357f80b..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: pns, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index a3eff61112..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: pns - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index 40d6ad36e4..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml deleted file mode 100644 index e1792aa3a0..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 0f332f2bc2..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index b66a91c282..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.kubeflow - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index f70426fc0f..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.kubeflow - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index 7bf24ae247..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 882bac7aae..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a1ace55ddd..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/name: metadata - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index a9f1b4b8e0..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index 84f28c4472..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 8625b1f0ae..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 0c14927726..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index d34df92177..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 6b8e8f370b..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/ibm/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/add-anonymous-user-filter/kustomize_test.go b/tests/stacks/kubernetes/application/add-anonymous-user-filter/kustomize_test.go deleted file mode 100644 index 61de00fd17..0000000000 --- a/tests/stacks/kubernetes/application/add-anonymous-user-filter/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package add_anonymous_user_filter - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/add-anonymous-user-filter", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml b/tests/stacks/kubernetes/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml deleted file mode 100644 index 2dc41b3220..0000000000 --- a/tests/stacks/kubernetes/application/add-anonymous-user-filter/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_add-user-filter.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - name: add-user-filter - namespace: istio-system -spec: - filters: - - filterConfig: - inlineCode: | - function envoy_on_request(request_handle) - request_handle:headers():add("kubeflow-userid","anonymous@kubeflow.org") - end - filterName: envoy.lua - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - app: istio-ingressgateway diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/kustomize_test.go b/tests/stacks/kubernetes/application/cert-manager-crds/kustomize_test.go deleted file mode 100644 index d4777a5024..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/kustomize_test.go b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index db3eb719de..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index d8e47f2a94..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/stacks/kubernetes/application/cert-manager/kustomize_test.go b/tests/stacks/kubernetes/application/cert-manager/kustomize_test.go deleted file mode 100644 index 946c7f26f6..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 93e06c4304..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 36a2524012..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 21cdee5406..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 09a9cfab99..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index 6ae84bc8c0..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 33ab9729d5..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index 8a116d7b30..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 2a25e06d49..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 6ce5b8e0cc..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index f62a08529b..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index b0d464bfd5..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index ce897a6a3b..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index ad80b32de5..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index fb0a1201cf..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bea275aa9c..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index a276b13742..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index 13b98eeaae..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index d5f2de3e1b..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index bd1d73f13b..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 80792a8f24..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 7ee5331ba6..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bbc5ee440a..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 6a79270953..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index 854ffd11fe..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index 137f15e731..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index b19073be57..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index f40a39080a..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index d0a3fd2d22..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index adb10f9073..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index b25a401652..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index e71b15aaa6..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index 11c24d45c8..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index 882e257d96..0000000000 --- a/tests/stacks/kubernetes/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/kustomize_test.go b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/kustomize_test.go deleted file mode 100644 index b2d161998d..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway_1_3_1 - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/cluster-local-gateway-1-3-1", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 8192241e3a..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - strategy: - rollingUpdate: - maxSurge: null - maxUnavailable: null - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "false" - - name: ISTIO_META_WORKLOAD_NAME - value: cluster-local-gateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/cluster-local-gateway - image: docker.io/istio/proxyv2:1.3.1 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 5b01c913b8..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml deleted file mode 100644 index 225e1a47db..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-parameters-tbbdb2842d - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/kustomize_test.go b/tests/stacks/kubernetes/application/cluster-local-gateway/kustomize_test.go deleted file mode 100644 index 9775fa65a5..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/cluster-local-gateway", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 3a8a7a15c9..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,164 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: cluster-local-gateway - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index f412abdb0d..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml deleted file mode 100644 index 91d90c9dcd..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_cluster-local-gateway-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-local-gateway-istio-system -subjects: -- kind: ServiceAccount - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml deleted file mode 100644 index 225e1a47db..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_configmap_cluster-local-gateway-parameters-tbbdb2842d.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-parameters-tbbdb2842d - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/kubernetes/application/cluster-local-gateway/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/dex-auth/kustomize_test.go b/tests/stacks/kubernetes/application/dex-auth/kustomize_test.go deleted file mode 100644 index d30a11ff7c..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package dex_auth - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/dex-auth", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml deleted file mode 100644 index 196d4afd84..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authcodes.dex.coreos.com.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: authcodes.dex.coreos.com -spec: - group: dex.coreos.com - names: - kind: AuthCode - listKind: AuthCodeList - plural: authcodes - singular: authcode - scope: Namespaced - version: v1 diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml deleted file mode 100644 index d4d54842cd..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/apps_v1_deployment_dex.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: dex - name: dex - namespace: auth -spec: - replicas: 1 - selector: - matchLabels: - app: dex - template: - metadata: - labels: - app: dex - spec: - containers: - - command: - - dex - - serve - - /etc/dex/cfg/config.yaml - image: quay.io/dexidp/dex:v2.22.0 - name: dex - ports: - - containerPort: 5556 - name: http - volumeMounts: - - mountPath: /etc/dex/cfg - name: config - serviceAccountName: dex - volumes: - - configMap: - items: - - key: config.yaml - path: config.yaml - name: dex - name: config diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml deleted file mode 100644 index 242885f808..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/networking.istio.io_v1alpha3_virtualservice_dex.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: dex - namespace: auth -spec: - gateways: - - kubeflow/kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /dex/ - route: - - destination: - host: dex.auth.svc.cluster.local - port: - number: 5556 diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml deleted file mode 100644 index d4be922abe..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_dex.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - name: dex -rules: -- apiGroups: - - dex.coreos.com - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml deleted file mode 100644 index 9cd13936f9..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_dex.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - name: dex -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: dex -subjects: -- kind: ServiceAccount - name: dex - namespace: auth diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml deleted file mode 100644 index 898c8080cb..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-config.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - static_email: admin@kubeflow.org - static_password_hash: $2y$12$ruoM7FqXrpVgaol44eRZW.4HWS8SAvg6KYVVSCIwKQPBmTpCm.EeO -kind: ConfigMap -metadata: - name: dex-config - namespace: auth diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml deleted file mode 100644 index 5edf6b7027..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex-parameters.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - dex_domain: dex.example.com - issuer: http://dex.auth.svc.cluster.local:5556/dex - namespace: auth - oidc_redirect_uris: '["/login/oidc"]' - static_email: admin@example.com - static_password_hash: $2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W - static_user_id: 08a8684b-db88-4b73-90a9-3cd1661f5466 - static_username: admin -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: dex-parameters - namespace: auth diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml deleted file mode 100644 index bc57951959..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_configmap_dex.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -data: - config.yaml: | - issuer: http://dex.auth.svc.cluster.local:5556/dex - storage: - type: kubernetes - config: - inCluster: true - web: - http: 0.0.0.0:5556 - logger: - level: "debug" - format: text - oauth2: - skipApprovalScreen: true - enablePasswordDB: true - staticPasswords: - - email: admin@kubeflow.org - hash: $2y$12$ruoM7FqXrpVgaol44eRZW.4HWS8SAvg6KYVVSCIwKQPBmTpCm.EeO - username: admin - userID: 08a8684b-db88-4b73-90a9-3cd1661f5466 - staticClients: - - id: kubeflow-oidc-authservice - redirectURIs: ["/login/oidc"] - name: 'Dex Login Application' - secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok -kind: ConfigMap -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml deleted file mode 100644 index 6b34cabc07..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_namespace_auth.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: auth diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml deleted file mode 100644 index 3ab9b4542d..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_service_dex.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: dex - namespace: auth -spec: - ports: - - name: dex - nodePort: 32000 - port: 5556 - protocol: TCP - targetPort: 5556 - selector: - app: dex - type: NodePort diff --git a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml b/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml deleted file mode 100644 index 084f45058d..0000000000 --- a/tests/stacks/kubernetes/application/dex-auth/test_data/expected/~g_v1_serviceaccount_dex.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: dex - namespace: auth diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/kustomize_test.go b/tests/stacks/kubernetes/application/istio-1-3-1-stack/kustomize_test.go deleted file mode 100644 index 7291363718..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_1_3_1_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/istio-1-3-1-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index d7aa03f87d..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 7edbd19816..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-adapter - kustomize.component: istio-crds - package: adapter - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index 7864def1ea..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml deleted file mode 100644 index 1180849525..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: authorizationpolicies.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: AuthorizationPolicy - plural: authorizationpolicies - singular: authorizationpolicy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 2a4631cf5e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 138b667371..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index f0e7d55b9d..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 6a7257c6db..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 00470c08e2..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index d3560e8cbb..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index 787adcd33c..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index d08bd06c40..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-handler - kustomize.component: istio-crds - package: handler - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 5efdd1c1bd..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index f3c47edcf6..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 106fb5f240..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-instance - kustomize.component: istio-crds - package: instance - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index 18ab2ea4c9..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 8acfb192f2..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 796c9fa8e6..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index 7f6d447e54..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index cf34ff9565..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 782ac3f591..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 420974db07..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index e57f11c367..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index e52b86065a..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index bb19b9a158..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index f8b6e02a93..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index dcb1f2185e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 57df1e0445..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-template - kustomize.component: istio-crds - package: template - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index 26e9eb1a10..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml deleted file mode 100644 index ac07dec74a..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app: nodeagent - istio: nodeagent - name: istio-nodeagent - namespace: istio-system -spec: - selector: - matchLabels: - istio: nodeagent - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: nodeagent - istio: nodeagent - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: CA_ADDR - value: istio-citadel:8060 - - name: CA_PROVIDER - value: Citadel - - name: PLUGINS - value: "" - - name: VALID_TOKEN - value: "true" - - name: TRUST_DOMAIN - value: "" - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/istio-release/node-agent-k8s:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: nodeagent - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - serviceAccountName: istio-nodeagent-service-account - tolerations: - - effect: NoExecute - operator: Exists - - effect: NoSchedule - operator: Exists - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 71d2e3470e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: citadel - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - istio: citadel - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --sds-enabled=true - - --append-dns-names=true - - --grpc-port=8060 - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - - --workload-cert-ttl=2160h - env: - - name: CITADEL_ENABLE_NAMESPACES_BY_DEFAULT - value: "true" - image: gcr.io/istio-release/citadel:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 5b344bf192..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: galley - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - istio: galley - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=false - - --validation-webhook-config-file - - /etc/config/validating-webhook-configuration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - image: gcr.io/istio-release/galley:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 61171d41be..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - istio: ingressgateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - MUTUAL_TLS - - --discoveryAddress - - istio-pilot:15011 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "true" - - name: ISTIO_META_WORKLOAD_NAME - value: istio-ingressgateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/istio-ingressgateway - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 2287dd6a98..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - istio: pilot - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "1" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_OUTBOUND - value: "true" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_INBOUND - value: "false" - image: gcr.io/istio-release/pilot:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - requests: - cpu: 500m - memory: 2048Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - serviceAccountName: istio-pilot-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 27069e1098..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - istio: mixer - istio-mixer-type: policy - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --useTemplateCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index c2ef009a0f..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,117 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: sidecar-injector - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: gcr.io/istio-release/sidecar_injector:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - - key: values - path: values - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index dc32c6d0e8..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --certFile=/etc/certs/cert-chain.pem - - --keyFile=/etc/certs/key.pem - - --caCertFile=/etc/certs/root-cert.pem - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 4800m - memory: 4G - requests: - cpu: 1000m - memory: 1G - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index bd61a789cb..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yaml - image: docker.io/prom/prometheus:v2.8.0 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index b11d522036..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 5c0aeb158b..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index 96d1bb443e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index f8de3ad33a..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml deleted file mode 100644 index bc3e9b5c7e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - labels: - app: security - name: istio-security-post-install-release-1.3-latest-daily - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/istio-security-run.sh - - /tmp/security/istio-security-custom-resources.yaml - image: gcr.io/istio-release/kubectl:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index 194c9f3e74..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.proxy_version: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 2b48f38df5..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 6eb5203232..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 591f65ede8..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,213 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml deleted file mode 100644 index def828bfeb..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: attributes - namespace: istio-system -spec: - attributeBindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - compiledTemplate: kubernetes - params: - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml deleted file mode 100644 index d36350d7ce..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestcount - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml deleted file mode 100644 index e8e7f5cae8..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestduration - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml deleted file mode 100644 index 92a052306a..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestsize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml deleted file mode 100644 index 8fa51f640f..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: responsesize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml deleted file mode 100644 index 17059fe110..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytereceived - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml deleted file mode 100644 index 2916bd6d5c..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytesent - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml deleted file mode 100644 index a11ed65696..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsclosed - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml deleted file mode 100644 index a54cf0fefc..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsopened - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 4f64a20efa..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 1bf9b97a14..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount - - requestduration - - requestsize - - responsesize - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) && (match((request.useragent | "-"), "Prometheus*") - == false) diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index ba53469288..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent - - tcpbytereceived - match: context.protocol == "tcp" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 88b56a9f61..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index d6a57b5eb4..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 359f4d4d82..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes - match: context.protocol == "tcp" diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 6bb534ca87..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index dcc865c1ce..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 504e447036..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 8ab724961f..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 48ef2e374c..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ab4d9b137..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - istio: mixer - istio-mixer-type: policy - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml deleted file mode 100644 index 6b92933e30..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - istio: sidecar-injector diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index af62a9392d..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index b2b648f7bf..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - namespaces - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index b07c27bde8..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index e891d1f64e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 712d854b96..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fba93e72ed..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index e058905249..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 7dcde2e12d..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index f3d3217415..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 356d3081d9..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 0c41554f71..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 3cf724b359..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 416d69e15c..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-nodeagent-istio-system -subjects: -- kind: ServiceAccount - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index eb97384bfa..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index 53b0c9ba50..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index ee14afcdaa..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 0d6ca7e082..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 7516510d7e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml deleted file mode 100644 index ccd2b2092a..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - rules: - - services: - - istio-ingressgateway.istio-system.svc.cluster.local diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml deleted file mode 100644 index 91340ebbb5..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - roleRef: - kind: ServiceRole - name: istio-ingressgateway - subjects: - - user: '*' diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index 81512e2b6c..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,120 +0,0 @@ -apiVersion: v1 -data: - validating-webhook-configuration.yaml: | - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - labels: - app: galley - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - sideEffects: None - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - - adapters - - handlers - - instances - - templates - - zipkins - failurePolicy: Fail - sideEffects: None -kind: ConfigMap -metadata: - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml deleted file mode 100644 index db0e477760..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-parameters-5kmkd2f29g.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - name: istio-install-parameters-5kmkd2f29g - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 3e86dfa9f0..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: v1 -data: - istio-security-custom-resources.yaml: | - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - spec: - peers: - - mtls: - mode: PERMISSIVE - istio-security-run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index af6866c735..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,405 +0,0 @@ -apiVersion: v1 -data: - config: |- - policy: enabled - alwaysInjectSelector: - [] - neverInjectSelector: - [] - template: |- - rewriteAppHTTPProbe: {{ valueOrDefault .Values.sidecarInjectorWebhook.rewriteAppHTTPProbe false }} - {{- if or (not .Values.istio_cni.enabled) .Values.global.proxy.enableCoreDump }} - initContainers: - {{ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `NONE` }} - {{- if not .Values.istio_cni.enabled }} - - name: istio-init - {{- if contains "/" .Values.global.proxy_init.image }} - image: "{{ .Values.global.proxy_init.image }}" - {{- else }} - image: "{{ .Values.global.hub }}/{{ .Values.global.proxy_init.image }}:{{ .Values.global.tag }}" - {{- end }} - args: - - "-p" - - "15001" - - "-z" - - "15006" - - "-u" - - 1337 - - "-m" - - "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - - "-i" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - - "-x" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - - "-b" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` `*` }}" - - "-d" - - "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") -}} - - "-o" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{ end -}} - {{ if (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -}} - - "-k" - - "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - {{ end -}} - imagePullPolicy: "{{ .Values.global.imagePullPolicy }}" - {{- if .Values.global.proxy.init.resources }} - resources: - {{ toYaml .Values.global.proxy.init.resources | indent 4 }} - {{- else }} - resources: {} - {{- end }} - securityContext: - runAsUser: 0 - runAsNonRoot: false - capabilities: - add: - - NET_ADMIN - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - restartPolicy: Always - {{- end }} - {{ end -}} - {{- if eq .Values.global.proxy.enableCoreDump true }} - - name: enable-core-dump - args: - - -c - - sysctl -w kernel.core_pattern=/var/lib/istio/core.proxy && ulimit -c unlimited - command: - - /bin/sh - image: {{ $.Values.global.proxy.enableCoreDumpImage }} - imagePullPolicy: IfNotPresent - resources: {} - securityContext: - runAsUser: 0 - runAsNonRoot: false - privileged: true - {{ end }} - {{- end }} - containers: - - name: istio-proxy - {{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}" - {{- else }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.hub }}/{{ .Values.global.proxy.image }}:{{ .Values.global.tag }}" - {{- end }} - ports: - - containerPort: 15090 - protocol: TCP - name: http-envoy-prom - args: - - proxy - - sidecar - - --domain - - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }} - - --configPath - - "{{ .ProxyConfig.ConfigPath }}" - - --binaryPath - - "{{ .ProxyConfig.BinaryPath }}" - - --serviceCluster - {{ if ne "" (index .ObjectMeta.Labels "app") -}} - - "{{ index .ObjectMeta.Labels `app` }}.$(POD_NAMESPACE)" - {{ else -}} - - "{{ valueOrDefault .DeploymentMeta.Name `istio-proxy` }}.{{ valueOrDefault .DeploymentMeta.Namespace `default` }}" - {{ end -}} - - --drainDuration - - "{{ formatDuration .ProxyConfig.DrainDuration }}" - - --parentShutdownDuration - - "{{ formatDuration .ProxyConfig.ParentShutdownDuration }}" - - --discoveryAddress - - "{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}" - {{- if eq .Values.global.proxy.tracer "lightstep" }} - - --lightstepAddress - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAddress }}" - - --lightstepAccessToken - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAccessToken }}" - - --lightstepSecure={{ .ProxyConfig.GetTracing.GetLightstep.GetSecure }} - - --lightstepCacertPath - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }}" - {{- else if eq .Values.global.proxy.tracer "zipkin" }} - - --zipkinAddress - - "{{ .ProxyConfig.GetTracing.GetZipkin.GetAddress }}" - {{- else if eq .Values.global.proxy.tracer "datadog" }} - - --datadogAgentAddress - - "{{ .ProxyConfig.GetTracing.GetDatadog.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.logLevel }} - - --proxyLogLevel={{ .Values.global.proxy.logLevel }} - {{- end}} - {{- if .Values.global.proxy.componentLogLevel }} - - --proxyComponentLogLevel={{ .Values.global.proxy.componentLogLevel }} - {{- end}} - - --dnsRefreshRate - - {{ .Values.global.proxy.dnsRefreshRate }} - - --connectTimeout - - "{{ formatDuration .ProxyConfig.ConnectTimeout }}" - {{- if .Values.global.proxy.envoyStatsd.enabled }} - - --statsdUdpAddress - - "{{ .ProxyConfig.StatsdUdpAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyMetricsService.enabled }} - - --envoyMetricsServiceAddress - - "{{ .ProxyConfig.GetEnvoyMetricsService.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyAccessLogService.enabled }} - - --envoyAccessLogService - - '{{ structToJSON .ProxyConfig.EnvoyAccessLogService }}' - {{- end }} - - --proxyAdminPort - - "{{ .ProxyConfig.ProxyAdminPort }}" - {{ if gt .ProxyConfig.Concurrency 0 -}} - - --concurrency - - "{{ .ProxyConfig.Concurrency }}" - {{ end -}} - - --controlPlaneAuthPolicy - - "{{ annotation .ObjectMeta `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy }}" - {{- if (ne (annotation .ObjectMeta "status.sidecar.istio.io/port" .Values.global.proxy.statusPort) "0") }} - - --statusPort - - "{{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }}" - - --applicationPorts - - "{{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` (applicationPorts .Spec.Containers) }}" - {{- end }} - {{- if .Values.global.trustDomain }} - - --trust-domain={{ .Values.global.trustDomain }} - {{- end }} - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_POD_PORTS - value: |- - [ - {{- range $index1, $c := .Spec.Containers }} - {{- range $index2, $p := $c.Ports }} - {{if or (ne $index1 0) (ne $index2 0)}},{{end}}{{ structToJSON $p }} - {{- end}} - {{- end}} - ] - - name: ISTIO_META_CLUSTER_ID - value: "{{ valueOrDefault .Values.global.multicluster.clusterName `Kubernetes` }}" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - {{- if eq .Values.global.proxy.tracer "datadog" }} - - name: HOST_IP - valueFrom: - fieldRef: - fieldPath: status.hostIP - {{- if isset .ObjectMeta.Annotations `apm.datadoghq.com/env` }} - {{- range $key, $value := fromJSON (index .ObjectMeta.Annotations `apm.datadoghq.com/env`) }} - - name: {{ $key }} - value: "{{ $value }}" - {{- end }} - {{- end }} - {{- end }} - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: {{ $.Values.global.sds.enabled }} - - name: ISTIO_META_INTERCEPTION_MODE - value: "{{ or (index .ObjectMeta.Annotations `sidecar.istio.io/interceptionMode`) .ProxyConfig.InterceptionMode.String }}" - - name: ISTIO_META_INCLUDE_INBOUND_PORTS - value: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (applicationPorts .Spec.Containers) }}" - {{- if .Values.global.network }} - - name: ISTIO_META_NETWORK - value: "{{ .Values.global.network }}" - {{- end }} - {{ if .ObjectMeta.Annotations }} - - name: ISTIO_METAJSON_ANNOTATIONS - value: | - {{ toJSON .ObjectMeta.Annotations }} - {{ end }} - {{ if .ObjectMeta.Labels }} - - name: ISTIO_METAJSON_LABELS - value: | - {{ toJSON .ObjectMeta.Labels }} - {{ end }} - {{- if .DeploymentMeta.Name }} - - name: ISTIO_META_WORKLOAD_NAME - value: {{ .DeploymentMeta.Name }} - {{ end }} - {{- if and .TypeMeta.APIVersion .DeploymentMeta.Name }} - - name: ISTIO_META_OWNER - value: kubernetes://api/{{ .TypeMeta.APIVersion }}/namespaces/{{ valueOrDefault .DeploymentMeta.Namespace `default` }}/{{ toLower .TypeMeta.Kind}}s/{{ .DeploymentMeta.Name }} - {{- end}} - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: ISTIO_BOOTSTRAP_OVERRIDE - value: "/etc/istio/custom-bootstrap/custom_bootstrap.json" - {{- end }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: ISTIO_META_SDS_TOKEN_PATH - value: "{{ .Values.global.sds.customTokenDirectory -}}/sdstoken" - {{- end }} - {{- if .Values.global.meshID }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.meshID }}" - {{- else if .Values.global.trustDomain }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.trustDomain }}" - {{- end }} - imagePullPolicy: {{ .Values.global.imagePullPolicy }} - {{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }} - readinessProbe: - httpGet: - path: /healthz/ready - port: {{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }} - initialDelaySeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` .Values.global.proxy.readinessInitialDelaySeconds }} - periodSeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` .Values.global.proxy.readinessPeriodSeconds }} - failureThreshold: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` .Values.global.proxy.readinessFailureThreshold }} - {{ end -}} - securityContext: - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - {{- if ne .Values.global.proxy.enableCoreDump true }} - readOnlyRootFilesystem: true - {{- end }} - {{ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY` -}} - capabilities: - add: - - NET_ADMIN - runAsGroup: 1337 - {{ else -}} - {{ if .Values.global.sds.enabled }} - runAsGroup: 1337 - {{- end }} - runAsUser: 1337 - {{- end }} - resources: - {{ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - requests: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -}} - cpu: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` }}" - {{ end}} - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - memory: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` }}" - {{ end }} - {{ else -}} - {{- if .Values.global.proxy.resources }} - {{ toYaml .Values.global.proxy.resources | indent 4 }} - {{- end }} - {{ end -}} - volumeMounts: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - mountPath: /etc/istio/custom-bootstrap - name: custom-bootstrap-volume - {{- end }} - - mountPath: /etc/istio/proxy - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - {{- if .Values.global.sds.customTokenDirectory }} - - mountPath: "{{ .Values.global.sds.customTokenDirectory -}}" - name: custom-sds-token - readOnly: true - {{- end }} - {{- else }} - - mountPath: /etc/certs/ - name: istio-certs - readOnly: true - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - mountPath: {{ directory .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }} - name: lightstep-certs - readOnly: true - {{- end }} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` }} - {{ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 4 }} - {{ end }} - {{- end }} - volumes: - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: custom-bootstrap-volume - configMap: - name: {{ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` "" }} - {{- end }} - - emptyDir: - medium: Memory - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - name: sds-uds-path - hostPath: - path: /var/run/sds - - name: istio-token - projected: - sources: - - serviceAccountToken: - path: istio-token - expirationSeconds: 43200 - audience: {{ .Values.global.sds.token.aud }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: custom-sds-token - secret: - secretName: sdstokensecret - {{- end }} - {{- else }} - - name: istio-certs - secret: - optional: true - {{ if eq .Spec.ServiceAccountName "" }} - secretName: istio.default - {{ else -}} - secretName: {{ printf "istio.%s" .Spec.ServiceAccountName }} - {{ end -}} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` }} - {{range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 2 }} - {{ end }} - {{ end }} - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - name: lightstep-certs - secret: - optional: true - secretName: lightstep.cacert - {{- end }} - {{- if .Values.global.podDNSSearchNamespaces }} - dnsConfig: - searches: - {{- range .Values.global.podDNSSearchNamespaces }} - - {{ render . }} - {{- end }} - {{- end }} - podRedirectAnnot: - sidecar.istio.io/interceptionMode: "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - traffic.sidecar.istio.io/includeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - traffic.sidecar.istio.io/excludeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - traffic.sidecar.istio.io/includeInboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (includeInboundPorts .Spec.Containers) }}" - traffic.sidecar.istio.io/excludeInboundPorts: "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") }} - traffic.sidecar.istio.io/excludeOutboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{- end }} - traffic.sidecar.istio.io/kubevirtInterfaces: "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - values: '{"certmanager":{"enabled":false},"galley":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"galley","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"gateways":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"istio-egressgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"labels":{"app":"istio-egressgateway","istio":"egressgateway"},"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"http2","port":80},{"name":"https","port":443},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/egressgateway-certs","name":"egressgateway-certs","secretName":"istio-egressgateway-certs"},{"mountPath":"/etc/istio/egressgateway-ca-certs","name":"egressgateway-ca-certs","secretName":"istio-egressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"ClusterIP"},"istio-ilbgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"labels":{"app":"istio-ilbgateway","istio":"ilbgateway"},"loadBalancerIP":"","nodeSelector":{},"podAnnotations":{},"ports":[{"name":"grpc-pilot-mtls","port":15011},{"name":"grpc-pilot","port":15010},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns","port":5353}],"resources":{"requests":{"cpu":"800m","memory":"512Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/ilbgateway-certs","name":"ilbgateway-certs","secretName":"istio-ilbgateway-certs"},{"mountPath":"/etc/istio/ilbgateway-ca-certs","name":"ilbgateway-ca-certs","secretName":"istio-ilbgateway-ca-certs"}],"serviceAnnotations":{"cloud.google.com/load-balancer-type":"internal"},"tolerations":[],"type":"LoadBalancer"},"istio-ingressgateway":{"applicationPorts":"","autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"externalIPs":[],"labels":{"app":"istio-ingressgateway","istio":"ingressgateway"},"loadBalancerIP":"","loadBalancerSourceRanges":[],"meshExpansionPorts":[{"name":"tcp-pilot-grpc-tls","port":15011,"targetPort":15011},{"name":"tcp-mixer-grpc-tls","port":15004,"targetPort":15004},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns-tls","port":853,"targetPort":853}],"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"status-port","port":15020,"targetPort":15020},{"name":"http2","nodePort":31380,"port":80,"targetPort":80},{"name":"https","nodePort":31390,"port":443},{"name":"tcp","nodePort":31400,"port":31400},{"name":"https-kiali","port":15029,"targetPort":15029},{"name":"https-prometheus","port":15030,"targetPort":15030},{"name":"https-grafana","port":15031,"targetPort":15031},{"name":"https-tracing","port":15032,"targetPort":15032},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sds":{"enabled":false,"image":"node-agent-k8s","resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}},"secretVolumes":[{"mountPath":"/etc/istio/ingressgateway-certs","name":"ingressgateway-certs","secretName":"istio-ingressgateway-certs"},{"mountPath":"/etc/istio/ingressgateway-ca-certs","name":"ingressgateway-ca-certs","secretName":"istio-ingressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"LoadBalancer"}},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"grafana":{"enabled":false},"istio_cni":{"enabled":false},"istiocoredns":{"enabled":false},"kiali":{"enabled":false},"mixer":{"adapters":{"kubernetesenv":{"enabled":true},"prometheus":{"enabled":true,"metricsExpiryDuration":"10m"},"stdio":{"enabled":false,"outputAsJson":true},"useAdapterCRDs":false},"env":{"GODEBUG":"gctrace=1","GOMAXPROCS":"6"},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"mixer","nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"policy":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%"},"telemetry":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"loadshedding":{"latencyThreshold":"100ms","mode":"enforce"},"replicaCount":1,"reportBatchMaxEntries":100,"reportBatchMaxTime":"1s","resources":{"limits":{"cpu":"4800m","memory":"4G"},"requests":{"cpu":"1000m","memory":"1G"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sessionAffinityEnabled":false},"tolerations":[]},"nodeagent":{"enabled":true,"env":{"CA_ADDR":"istio-citadel:8060","CA_PROVIDER":"Citadel","PLUGINS":"","VALID_TOKEN":true},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"node-agent-k8s","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"tolerations":[]},"pilot":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enableProtocolSniffingForInbound":false,"enableProtocolSniffingForOutbound":true,"enabled":true,"env":{"GODEBUG":"gctrace=1","PILOT_PUSH_THROTTLE":100},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"pilot","keepaliveMaxServerConnectionAge":"30m","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"resources":{"requests":{"cpu":"500m","memory":"2048Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sidecar":true,"tolerations":[],"traceSampling":1},"prometheus":{"contextPath":"/prometheus","enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"hub":"docker.io/prom","image":"prometheus","ingress":{"annotations":null,"enabled":false,"hosts":["prometheus.local"],"tls":null},"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"retention":"6h","scrapeInterval":"15s","security":{"enabled":true},"service":{"annotations":{},"nodePort":{"enabled":false,"port":32090}},"tag":"v2.8.0","tolerations":[]},"security":{"citadelHealthCheck":false,"createMeshPolicy":true,"enableNamespacesByDefault":true,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"citadel","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","selfSigned":true,"tolerations":[],"workloadCertTtl":"2160h"},"sidecarInjectorWebhook":{"alwaysInjectSelector":[],"enableNamespacesByDefault":false,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"sidecar_injector","neverInjectSelector":[],"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rewriteAppHTTPProbe":false,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"tracing":{"enabled":false}}' -kind: ConfigMap -metadata: - labels: - app: istio - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index 212eae498f..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: v1 -data: - mesh: |- - # Set the following variable to true to disable policy checks by the Mixer. - # Note that metrics will still be reported to the Mixer. - disablePolicyChecks: true - # reportBatchMaxEntries is the number of requests that are batched before telemetry data is sent to the mixer server - reportBatchMaxEntries: 100 - # reportBatchMaxTime is the max waiting time before the telemetry data of a request is sent to the mixer server - reportBatchMaxTime: 1s - - # Set enableTracing to false to disable request tracing. - enableTracing: true - - # Set accessLogFile to empty string to disable access log. - accessLogFile: "" - - # If accessLogEncoding is TEXT, value will be used directly as the log format - # example: "[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\n" - # If AccessLogEncoding is JSON, value will be parsed as map[string]string - # example: '{"start_time": "%START_TIME%", "req_method": "%REQ(:METHOD)%"}' - # Leave empty to use default log format - accessLogFormat: "" - - # Set accessLogEncoding to JSON or TEXT to configure sidecar access log - accessLogEncoding: 'TEXT' - - enableEnvoyAccessLogService: false - mixerCheckServer: istio-policy.istio-system.svc.cluster.local:15004 - mixerReportServer: istio-telemetry.istio-system.svc.cluster.local:15004 - # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached. - # Default is false which means the traffic is denied when the client is unable to connect to Mixer. - policyCheckFailOpen: false - # Let Pilot give ingresses the public IP of the Istio ingressgateway - ingressService: istio-ingressgateway - - # Default connect timeout for dynamic clusters generated by Pilot and returned via XDS - connectTimeout: 10s - - # Automatic protocol detection uses a set of heuristics to - # determine whether the connection is using TLS or not (on the - # server side), as well as the application protocol being used - # (e.g., http vs tcp). These heuristics rely on the client sending - # the first bits of data. For server first protocols like MySQL, - # MongoDB, etc., Envoy will timeout on the protocol detection after - # the specified period, defaulting to non mTLS plain TCP - # traffic. Set this field to tweak the period that Envoy will wait - # for the client to send the first bits of data. (MUST BE >=1ms) - protocolDetectionTimeout: 100ms - - # DNS refresh rate for Envoy clusters of type STRICT_DNS - dnsRefreshRate: 300s - - # Unix Domain Socket through which envoy communicates with NodeAgent SDS to get - # key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - sdsUdsPath: "unix:/var/run/sds/uds_path" - - # The trust domain corresponds to the trust root of a system. - # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain - trustDomain: "" - - # Set the default behavior of the sidecar for handling outbound traffic from the application: - # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no - # services or ServiceEntries for the destination port - # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well - # as those defined through ServiceEntries - outboundTrafficPolicy: - mode: ALLOW_ANY - localityLbSetting: - enabled: true - # The namespace to treat as the administrative root namespace for istio - # configuration. - rootNamespace: istio-system - configSources: - - address: istio-galley.istio-system.svc:9901 - tlsSettings: - mode: ISTIO_MUTUAL - - defaultConfig: - # - # TCP connection timeout between Envoy & the application, and between Envoys. Used for static clusters - # defined in Envoy's configuration file - connectTimeout: 10s - # - ### ADVANCED SETTINGS ############# - # Where should envoy's configuration be stored in the istio-proxy container - configPath: "/etc/istio/proxy" - binaryPath: "/usr/local/bin/envoy" - # The pseudo service name used for Envoy. - serviceCluster: istio-proxy - # These settings that determine how long an old Envoy - # process should be kept alive after an occasional reload. - drainDuration: 45s - parentShutdownDuration: 1m0s - # - # The mode used to redirect inbound connections to Envoy. This setting - # has no effect on outbound traffic: iptables REDIRECT is always used for - # outbound connections. - # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. - # The "REDIRECT" mode loses source addresses during redirection. - # If "TPROXY", use iptables TPROXY to redirect to Envoy. - # The "TPROXY" mode preserves both the source and destination IP - # addresses and ports, so that they can be used for advanced filtering - # and manipulation. - # The "TPROXY" mode also configures the sidecar to run with the - # CAP_NET_ADMIN capability, which is required to use TPROXY. - #interceptionMode: REDIRECT - # - # Port where Envoy listens (on local host) for admin commands - # You can exec into the istio-proxy container in a pod and - # curl the admin port (curl http://localhost:15000/) to obtain - # diagnostic information from Envoy. See - # https://lyft.github.io/envoy/docs/operations/admin.html - # for more details - proxyAdminPort: 15000 - # - # Set concurrency to a specific number to control the number of Proxy worker threads. - # If set to 0 (default), then start worker thread for each CPU thread/core. - concurrency: 2 - # - tracing: - zipkin: - # Address of the Zipkin collector - address: zipkin.istio-system:9411 - # - # Mutual TLS authentication between sidecars and istio control plane. - controlPlaneAuthPolicy: MUTUAL_TLS - # - # Address where istio Pilot service is running - discoveryAddress: istio-pilot.istio-system:15011 - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index bab14b0984..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,276 +0,0 @@ -apiVersion: v1 -data: - prometheus.yaml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index f394e916f9..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 852fd9feff..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index ea2d39ca12..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index a590dc8ab9..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - type: NodePort diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 7f7aac66b2..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 92eddb06cd..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 2013882d45..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - name: https-inject - port: 443 - - name: http-monitoring - port: 15014 - selector: - istio: sidecar-injector diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index b02397a061..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index 147fda3aac..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index bfd1afc2a9..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index a1fdfb36c4..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index 7d7230c868..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index 9630e83a84..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml deleted file mode 100644 index 74f7f7a736..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: nodeagent - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index 066bd7fa6e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index 26c77ce158..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index 3b225d382e..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 1cb719e1cd..0000000000 --- a/tests/stacks/kubernetes/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/kustomize_test.go b/tests/stacks/kubernetes/application/istio-stack/kustomize_test.go deleted file mode 100644 index 6afed0fb66..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/istio-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index 45f3d51ee0..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - release: istio - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 306a83db93..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: adapter - release: istio - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml deleted file mode 100644 index d0385f0e48..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: apikey - release: istio - name: apikeys.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: apikey - plural: apikeys - singular: apikey - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index b904f823e8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml deleted file mode 100644 index e7f9bb2ca1..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: authorization - release: istio - name: authorizations.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: authorization - plural: authorizations - singular: authorization - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml deleted file mode 100644 index 5d853a10d2..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: bypass - release: istio - name: bypasses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: bypass - plural: bypasses - singular: bypass - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 188a1093cd..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 08e76be423..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml deleted file mode 100644 index f31fc2477e..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: checknothing - release: istio - name: checknothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: checknothing - plural: checknothings - singular: checknothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml deleted file mode 100644 index e5b7194645..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: circonus - release: istio - name: circonuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: circonus - plural: circonuses - singular: circonus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml deleted file mode 100644 index 0c2c35ff0c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: cloudwatch - name: cloudwatches.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: cloudwatch - plural: cloudwatches - singular: cloudwatch - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index dea35ef84c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 366c18ebc7..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - heritage: Tiller - istio: rbac - release: istio - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml deleted file mode 100644 index 9d89ab9c83..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: denier - release: istio - name: deniers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: denier - plural: deniers - singular: denier - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 044b9a80e7..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml deleted file mode 100644 index 3e6d9dc8ef..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: dogstatsd - name: dogstatsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: dogstatsd - plural: dogstatsds - singular: dogstatsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml deleted file mode 100644 index 65099a24de..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: edge - release: istio - name: edges.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: edge - plural: edges - singular: edge - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index ed0739556e..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml deleted file mode 100644 index f3111ccc25..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: fluentd - release: istio - name: fluentds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: fluentd - plural: fluentds - singular: fluentd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index f7420c2f40..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index dab8c75f1b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-handler - package: handler - release: istio - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 1771daadae..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index cbf2f79146..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 9699fa820f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: instance - release: istio - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index a0c186a1d1..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml deleted file mode 100644 index 7b7da141af..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: kubernetesenv - release: istio - name: kubernetesenvs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetesenv - plural: kubernetesenvs - singular: kubernetesenv - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml deleted file mode 100644 index 91693505d6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: adapter.template.kubernetes - release: istio - name: kuberneteses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetes - plural: kuberneteses - singular: kubernetes - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml deleted file mode 100644 index cf59ae38ca..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: listchecker - release: istio - name: listcheckers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listchecker - plural: listcheckers - singular: listchecker - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml deleted file mode 100644 index 04806a76c8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: listentry - release: istio - name: listentries.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listentry - plural: listentries - singular: listentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml deleted file mode 100644 index d1d561e6da..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: logentry - release: istio - name: logentries.config.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.severity - description: The importance of the log entry - name: Severity - type: string - - JSONPath: .spec.timestamp - description: The time value for the log entry - name: Timestamp - type: string - - JSONPath: .spec.monitored_resource_type - description: Optional expression to compute the type of the monitored resource - this log entry is being recorded on - name: Res Type - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: logentry - plural: logentries - singular: logentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml deleted file mode 100644 index c36d6a5e64..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: memquota - release: istio - name: memquotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: memquota - plural: memquotas - singular: memquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 56fcaeb04d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml deleted file mode 100644 index 19a4a519c0..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: metric - release: istio - name: metrics.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: metric - plural: metrics - singular: metric - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml deleted file mode 100644 index c8cadbd41e..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: noop - release: istio - name: noops.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: noop - plural: noops - singular: noop - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml deleted file mode 100644 index 9368360492..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: opa - release: istio - name: opas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: opa - plural: opas - singular: opa - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 06d5359def..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index b9933dfd96..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml deleted file mode 100644 index 07d9e146fc..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: prometheus - release: istio - name: prometheuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: prometheus - plural: prometheuses - singular: prometheus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml deleted file mode 100644 index df929bfdd9..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: quota - release: istio - name: quotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: quota - plural: quotas - singular: quota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index 7434f2f66d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 53d48ab742..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 7883b0d7c3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml deleted file mode 100644 index a197d882a7..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: rbac - release: istio - name: rbacs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rbac - plural: rbacs - singular: rbac - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml deleted file mode 100644 index 15158d0df6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: redisquota - release: istio - name: redisquotas.config.istio.io -spec: - group: config.istio.io - names: - kind: redisquota - plural: redisquotas - singular: redisquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml deleted file mode 100644 index 899806b3a6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: reportnothing - release: istio - name: reportnothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: reportnothing - plural: reportnothings - singular: reportnothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index 40b5a703e5..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index db8fa18cb8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index 6228a334b0..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index 24d78ee506..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index 059355b082..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml deleted file mode 100644 index dfe2f4c61e..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: signalfx - release: istio - name: signalfxs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: signalfx - plural: signalfxs - singular: signalfx - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml deleted file mode 100644 index 6b758b40d9..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: solarwinds - release: istio - name: solarwindses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: solarwinds - plural: solarwindses - singular: solarwinds - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml deleted file mode 100644 index c3e9b39dcd..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stackdriver - release: istio - name: stackdrivers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stackdriver - plural: stackdrivers - singular: stackdriver - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml deleted file mode 100644 index 7b3da3e069..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: statsd - release: istio - name: statsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: statsd - plural: statsds - singular: statsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml deleted file mode 100644 index 1918fa9b19..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stdio - release: istio - name: stdios.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stdio - plural: stdios - singular: stdio - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 60c365f949..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-template - package: template - release: istio - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml deleted file mode 100644 index 677ffc60bb..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: tracespan - release: istio - name: tracespans.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: tracespan - plural: tracespans - singular: tracespan - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index fa7f9a0d80..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml deleted file mode 100644 index cfd1f91152..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: zipkin - name: zipkins.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: zipkin - plural: zipkins - singular: zipkin - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml deleted file mode 100644 index b4fba3181f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml +++ /dev/null @@ -1,152 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: GRAFANA_PORT - value: "3000" - - name: GF_AUTH_BASIC_ENABLED - value: "false" - - name: GF_AUTH_ANONYMOUS_ENABLED - value: "true" - - name: GF_AUTH_ANONYMOUS_ORG_ROLE - value: Admin - - name: GF_PATHS_DATA - value: /data/grafana - image: grafana/grafana:6.0.2 - imagePullPolicy: IfNotPresent - name: grafana - ports: - - containerPort: 3000 - readinessProbe: - httpGet: - path: /login - port: 3000 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /data/grafana - name: data - - mountPath: /var/lib/grafana/dashboards/istio/galley-dashboard.json - name: dashboards-istio-galley-dashboard - readOnly: true - subPath: galley-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-mesh-dashboard.json - name: dashboards-istio-istio-mesh-dashboard - readOnly: true - subPath: istio-mesh-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-performance-dashboard.json - name: dashboards-istio-istio-performance-dashboard - readOnly: true - subPath: istio-performance-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-service-dashboard.json - name: dashboards-istio-istio-service-dashboard - readOnly: true - subPath: istio-service-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-workload-dashboard.json - name: dashboards-istio-istio-workload-dashboard - readOnly: true - subPath: istio-workload-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/mixer-dashboard.json - name: dashboards-istio-mixer-dashboard - readOnly: true - subPath: mixer-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/pilot-dashboard.json - name: dashboards-istio-pilot-dashboard - readOnly: true - subPath: pilot-dashboard.json - - mountPath: /etc/grafana/provisioning/datasources/datasources.yaml - name: config - subPath: datasources.yaml - - mountPath: /etc/grafana/provisioning/dashboards/dashboardproviders.yaml - name: config - subPath: dashboardproviders.yaml - securityContext: - fsGroup: 472 - runAsUser: 472 - volumes: - - configMap: - name: istio-grafana - name: config - - emptyDir: {} - name: data - - configMap: - name: istio-grafana-configuration-dashboards-galley-dashboard - name: dashboards-istio-galley-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - name: dashboards-istio-istio-mesh-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - name: dashboards-istio-istio-performance-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-service-dashboard - name: dashboards-istio-istio-service-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - name: dashboards-istio-istio-workload-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-mixer-dashboard - name: dashboards-istio-mixer-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-pilot-dashboard - name: dashboards-istio-pilot-dashboard diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 8cf48324fd..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --append-dns-names=true - - --grpc-port=8060 - - --grpc-hostname=citadel - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - image: docker.io/istio/citadel:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml deleted file mode 100644 index 82a3fce5a3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml +++ /dev/null @@ -1,171 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-egressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-certs - name: egressgateway-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-ca-certs - name: egressgateway-ca-certs - readOnly: true - serviceAccountName: istio-egressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-egressgateway-service-account - - name: egressgateway-certs - secret: - optional: true - secretName: istio-egressgateway-certs - - name: egressgateway-ca-certs - secret: - optional: true - secretName: istio-egressgateway-ca-certs diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 9bdf1a9c23..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=true - - --validation-webhook-config-file - - /etc/config/validatingwebhookconfiguration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - - --enable-validation=true - image: docker.io/istio/galley:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 01d4547b36..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,177 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 3eaa8c4269..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "100" - - name: PILOT_DISABLE_XDS_MARSHALING_TO_ANY - value: "1" - image: docker.io/istio/pilot:1.1.6 - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - limits: - cpu: 100m - memory: 200Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - serviceAccountName: istio-pilot-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 204884f48a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,168 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index a7d7af79d5..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: docker.io/istio/sidecar_injector:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index e848f4ba90..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,172 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 50m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml deleted file mode 100644 index a67c51e985..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml +++ /dev/null @@ -1,99 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: istio-tracing - namespace: istio-system -spec: - selector: - matchLabels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - template: - metadata: - annotations: - prometheus.io/path: /jaeger/metrics - prometheus.io/port: "16686" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: COLLECTOR_ZIPKIN_HTTP_PORT - value: "9411" - - name: MEMORY_MAX_TRACES - value: "50000" - - name: QUERY_BASE_PATH - value: /jaeger - image: docker.io/jaegertracing/all-in-one:1.9 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: / - port: 16686 - name: jaeger - ports: - - containerPort: 9411 - - containerPort: 16686 - - containerPort: 5775 - protocol: UDP - - containerPort: 6831 - protocol: UDP - - containerPort: 6832 - protocol: UDP - readinessProbe: - httpGet: - path: / - port: 16686 - resources: - requests: - cpu: 10m diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml deleted file mode 100644 index 6bbccb9b25..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: kiali - template: - metadata: - annotations: - prometheus.io/port: "9090" - prometheus.io/scrape: "true" - scheduler.alpha.kubernetes.io/critical-pod: "" - sidecar.istio.io/inject: "false" - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /opt/kiali/kiali - - -config - - /kiali-configuration/config.yaml - - -v - - "4" - env: - - name: ACTIVE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: PROMETHEUS_SERVICE_URL - value: http://prometheus:9090 - - name: SERVER_WEB_ROOT - value: /kiali - image: docker.io/kiali/kiali:v0.16 - name: kiali - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /kiali-configuration - name: kiali-configuration - - mountPath: /kiali-secret - name: kiali-secret - serviceAccountName: kiali-service-account - volumes: - - configMap: - name: kiali - name: kiali-configuration - - name: kiali-secret - secret: - optional: true - secretName: kiali diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index 613cd2fe17..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,93 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yml - image: docker.io/prom/prometheus:v2.3.1 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml deleted file mode 100644 index cdbeef32e3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-egressgateway diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index c5a6bdd2d8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 1c3bd0a78a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index f33a22eeca..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index 8fc6b67d67..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml deleted file mode 100644 index e3cf64d5b2..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "3" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - -c - - | - kubectl get secret --all-namespaces | grep "istio.io/key-and-cert" | while read -r entry; do - ns=$(echo $entry | awk '{print $1}'); - name=$(echo $entry | awk '{print $2}'); - kubectl delete secret $name -n $ns; - done - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - restartPolicy: OnFailure - serviceAccountName: istio-cleanup-secrets-service-account diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml deleted file mode 100644 index 79d95f8258..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: istio-grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/grafana/run.sh - - /tmp/grafana/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - name: kubectl - volumeMounts: - - mountPath: /tmp/grafana - name: tmp-configmap-grafana - restartPolicy: OnFailure - serviceAccountName: istio-grafana-post-install-account - volumes: - - configMap: - name: istio-grafana-custom-resources - name: tmp-configmap-grafana diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml deleted file mode 100644 index f907dee1af..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/run.sh - - /tmp/security/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index d475e6bc55..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,138 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 6b39cc0347..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 41928afff6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv - params: null diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 7558b99229..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,216 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml deleted file mode 100644 index 2baf4e9096..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - compiledAdapter: stdio - params: - outputAsJson: true diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml deleted file mode 100644 index 1e66576783..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: kubernetes -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: attributes - namespace: istio-system -spec: - attribute_bindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml deleted file mode 100644 index c4098d4e17..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: accesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: request.time - variables: - apiClaims: request.auth.raw_claims | "" - apiKey: request.api_key | request.headers["x-api-key"] | "" - clientTraceId: request.headers["x-client-trace-id"] | "" - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - grpcMessage: response.grpc_message | "" - grpcStatus: response.grpc_status | "" - httpAuthority: request.headers[":authority"] | request.host | "" - latency: response.duration | "0ms" - method: request.method | "" - permissiveResponseCode: rbac.permissive.response_code | "none" - permissiveResponsePolicyID: rbac.permissive.effective_policy_id | "none" - protocol: request.scheme | context.protocol | "http" - receivedBytes: request.total_size | 0 - referer: request.referer | "" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestId: request.headers["x-request-id"] | "" - requestSize: request.size | 0 - requestedServerName: connection.requested_server_name | "" - responseCode: response.code | 0 - responseFlags: context.proxy_error_code | "" - responseSize: response.size | 0 - responseTimestamp: response.time - sentBytes: response.total_size | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - url: request.path | "" - userAgent: request.useragent | "" - xForwardedFor: request.headers["x-forwarded-for"] | "0.0.0.0" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml deleted file mode 100644 index 797b01697d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpaccesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: context.time | timestamp("2017-01-01T00:00:00Z") - variables: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - connectionDuration: connection.duration | "0ms" - connectionEvent: connection.event | "" - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - protocol: context.protocol | "tcp" - receivedBytes: connection.received.bytes | 0 - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestedServerName: connection.requested_server_name | "" - responseFlags: context.proxy_error_code | "" - sentBytes: connection.sent.bytes | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - totalReceivedBytes: connection.received.bytes_total | 0 - totalSentBytes: connection.sent.bytes_total | 0 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml deleted file mode 100644 index 5aa199b236..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestcount - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml deleted file mode 100644 index 914e4d4b5a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestduration - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml deleted file mode 100644 index 155343600d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestsize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml deleted file mode 100644 index d3aafb93c3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: responsesize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml deleted file mode 100644 index 33e8f468b9..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytereceived - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml deleted file mode 100644 index 39df34138c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytesent - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml deleted file mode 100644 index f2b80ce1d8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsclosed - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml deleted file mode 100644 index 68dbbf0c9c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsopened - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 16f89c981d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 6ba4b19caa..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount.metric - - requestduration.metric - - requestsize.metric - - responsesize.metric - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index 74466f18be..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent.metric - - tcpbytereceived.metric - match: context.protocol == "tcp" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 4414aa902c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index 5d119b596e..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml deleted file mode 100644 index 2d272125d1..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - accesslog.logentry - match: context.protocol == "http" || context.protocol == "grpc" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml deleted file mode 100644 index 339c38a2bd..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdiotcp - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - tcpaccesslog.logentry - match: context.protocol == "tcp" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 7e713777c2..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes - match: context.protocol == "tcp" diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 4bc62dd7f8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index 97db246c89..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml deleted file mode 100644 index a1c5f6ab12..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-egressgateway - istio: egressgateway - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 9a384b903b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 579d4ec2e0..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 73bd8933ad..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ac4f6464a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index ee5c3a1dee..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - release: istio diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index cb57ab8639..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index b31002df62..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - list - - delete diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 14745dd1b5..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index 31cd021e86..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,85 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml deleted file mode 100644 index f38f3710ac..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index ce57730853..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index 4c406989f2..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fbf58bcdd1..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index 06d72de038..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml deleted file mode 100644 index a00bd03674..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-viewer -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - servicecontrolreports - - servicecontrols - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - get - - list - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml deleted file mode 100644 index de91e8f85c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 4e42dfb6a6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index 28ac035ab6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index fcc37b18d8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "2" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-cleanup-secrets-istio-system -subjects: -- kind: ServiceAccount - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 291dd013b8..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-egressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 9c2ca1a82c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 473c34c42b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-grafana-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index c4b2804104..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-ingressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml deleted file mode 100644 index d1db23758b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: istio-kiali-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kiali -subjects: -- kind: ServiceAccount - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 8c801ce56f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index b7cccaacb3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - chart: istio-1.1.0 - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index fc78ced111..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index fc5d7a83d6..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index 455f52e864..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 57718cea6d..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 725830af27..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index cc77485872..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,123 +0,0 @@ -apiVersion: v1 -data: - validatingwebhookconfiguration.yaml: |- - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - namespace: istio-system - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - failurePolicy: Fail -kind: ConfigMap -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml deleted file mode 100644 index c7b460e359..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml +++ /dev/null @@ -1,341 +0,0 @@ -apiVersion: v1 -data: - galley-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- - Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", - "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 0 }, "id": 46, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"galley\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Galley Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 5 }, "id": 40, "panels": [], "title": "Resource Usage", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": - 6 }, "id": 36, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "process_virtual_memory_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Virtual Memory", - "refId": "A" }, { "expr": "process_resident_memory_bytes{job=\"galley\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", "refId": - "B" }, { "expr": "go_memstats_heap_sys_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "heap sys", "refId": "C" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "heap alloc", "refId": - "D" }, { "expr": "go_memstats_alloc_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F" }, { "expr": "go_memstats_heap_inuse_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": - "G" }, { "expr": "go_memstats_stack_inuse_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "H" }, { "expr": - "sum(container_memory_usage_bytes{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Total (kis)", "refId": - "E" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 6, "y": 6 }, "id": 38, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"}[1m]))", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": - "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}[1m])) by (container_name)", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B" - }, { "expr": "irate(process_cpu_seconds_total{job=\"galley\"}[1m])", "format": - "time_series", "intervalFactor": 2, "legendFormat": "galley (self-reported)", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 12, "y": 6 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"galley\"}", "format": "time_series", "intervalFactor": - 2, "legendFormat": "Open FDs (galley)", "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }} ", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeRegions": [], "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 6 }, "id": - 44, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "goroutines_total", - "refId": "A" }, { "expr": "galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "clients_total", "refId": "B" }, { "expr": - "go_goroutines{job=\"galley\"}/galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "avg_goroutines_per_client", "refId": "C" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 14 }, "id": 10, "panels": [], "title": "Runtime", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 15 }, "id": - 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(galley_runtime_strategy_on_change_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Strategy - Change Events", "refId": "A" }, { "expr": "sum(rate(galley_runtime_processor_events_processed_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Processed - Events", "refId": "B" }, { "expr": "sum(rate(galley_runtime_processor_snapshots_published_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Snapshot - Published", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Event Rates", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": "Events/min", "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": "", "logBase": 1, "max": null, "min": null, - "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 15 }, "id": 4, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(galley_runtime_strategy_timer_max_time_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Max Time - Reached", "refId": "A" }, { "expr": "sum(rate(galley_runtime_strategy_timer_quiesce_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Quiesce - Reached", "refId": "B" }, { "expr": "sum(rate(galley_runtime_strategy_timer_resets_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Timer Resets", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Timer Rates", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 15 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 3, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.50, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P50", "refId": - "A" }, { "expr": "histogram_quantile(0.90, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P90", "refId": - "B" }, { "expr": "histogram_quantile(0.95, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P95", "refId": - "C" }, { "expr": "histogram_quantile(0.99, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P99", "refId": - "D" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Events Per Snapshot", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by (typeURL) (galley_runtime_state_type_instances_total)", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ typeURL }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "State Type - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Count", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 27 }, "id": 34, "panels": [], "title": "Validation", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": - 28 }, "id": 28, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "galley_validation_cert_key_updates{job=\"galley\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Key Updates", "refId": - "A" }, { "expr": "galley_validation_cert_key_update_errors{job=\"galley\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Key Update Errors: {{ error - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], - "timeShift": null, "title": "Validation Webhook Certificate", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 28 }, "id": 30, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_passed{job=\"galley\"}) by (group, - version, resource)", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Passed: {{ group }}/{{ version }}/{{resource}}", "refId": "A" }, { "expr": "sum(galley_validation_failed{job=\"galley\"}) - by (group, version, resource, reason)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Failed: {{ group }}/{{ version }}/{{resource}} ({{ reason}})", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Resource Validation", "tooltip": { "shared": true, "sort": 0, - "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": - "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } - ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": - false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": - 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": 28 }, "id": 32, "legend": { "avg": - false, "current": false, "max": false, "min": false, "show": true, "total": false, - "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_http_error{job=\"galley\"}) by (status)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ status }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Validation HTTP Errors", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 34 }, "id": 12, "panels": [], "title": - "Kubernetes Source", "type": "row" }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 0, "y": 35 }, "id": 14, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_event_success_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Success", "refId": "A" }, { "expr": "rate(galley_source_kube_event_error_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Source Event Rate", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 35 }, "id": 16, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_dynamic_converter_success_total[1m]) * 60", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{apiVersion=\"{{apiVersion}}\",group=\"{{group}}\",kind=\"{{kind}}\"}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Successes", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Conversions/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": - 35 }, "id": 24, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(galley_source_kube_dynamic_converter_failure_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Failures", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Failures/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "collapsed": false, "gridPos": { "h": 1, "w": 24, "x": 0, "y": 41 - }, "id": 18, "panels": [], "title": "Mesh Configuration Protocol", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 42 }, "id": - 20, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(galley_mcp_source_clients_total)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Clients", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Connected Clients", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 42 }, "id": 22, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by(collection)(irate(galley_mcp_source_request_acks_total[1m]) * 60)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Request - ACKs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": "ACKs/min", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 42 }, "id": 26, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_mcp_source_request_nacks_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Request NACKs", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "NACKs/min", "logBase": 1, "max": null, "min": null, - "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, - "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } - } ], "refresh": "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": - { "list": [] }, "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Galley Dashboard", "uid": "TSEY6jLmk", "version": 1 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-galley-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml deleted file mode 100644 index 8be80d7176..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: v1 -data: - istio-mesh-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "singlestat", "name": - "Singlestat", "version": "5.0.0" }, { "type": "panel", "id": "table", "name": - "Table", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "content": - "
\n
\n Istio\n
\n
\n Istio - is an open platform - that provides a uniform way to connect,\n manage, and \n secure microservices.\n
\n Need help? Join the - Istio community.\n
\n
", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "50px", "id": 13, "links": - [], "mode": "html", "style": { "font-size": "18pt" }, "title": "", "transparent": - true, "type": "text" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": - false, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "datasource": "Prometheus", "format": "ops", "gauge": { "maxValue": - 100, "minValue": 0, "show": false, "thresholdLabels": false, "thresholdMarkers": - true }, "gridPos": { "h": 3, "w": 6, "x": 0, "y": 3 }, "id": 20, "interval": null, - "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", "value": - 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": - "connected", "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": - "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": - "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, - "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": "", "targets": - [ { "expr": "round(sum(irate(istio_requests_total{reporter=\"destination\"}[1m])), - 0.001)", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": "", "title": - "Global Request Volume", "transparent": false, "type": "singlestat", "valueFontSize": - "80%", "valueMaps": [ { "op": "=", "text": "N/A", "value": "null" } ], "valueName": - "avg" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": false, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "datasource": "Prometheus", "format": "percentunit", "gauge": { - "maxValue": 100, "minValue": 80, "show": false, "thresholdLabels": false, "thresholdMarkers": - false }, "gridPos": { "h": 3, "w": 6, "x": 6, "y": 3 }, "id": 21, "interval": - null, "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", - "value": 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, - "nullPointMode": "connected", "nullText": null, "postfix": "", "postfixFontSize": - "50%", "prefix": "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", - "text": "N/A", "to": "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, - 0.18)", "full": true, "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": - "", "targets": [ { "expr": "sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) / sum(rate(istio_requests_total{reporter=\"destination\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": - "95, 99, 99.5", "title": "Global Success Rate (non-5xx responses)", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 12, "y": 3 }, "id": 22, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"4.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "4xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 18, "y": 3 }, "id": 23, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"5.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "5xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "columns": [], "datasource": - "Prometheus", "fontSize": "100%", "gridPos": { "h": 21, "w": 24, "x": 0, "y": - 6 }, "hideTimeOverride": false, "id": 73, "links": [], "pageSize": null, "repeat": - null, "repeatDirection": "v", "scroll": true, "showHeader": true, "sort": { "col": - 4, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": false, "linkTargetBlank": - false, "linkTooltip": "Workload dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_2&var-workload=$__cell_", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": - "Time", "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Requests", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [], "type": "number", "unit": "ops" }, - { "alias": "P50 Latency", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "Value #B", "thresholds": [], "type": "number", - "unit": "s" }, { "alias": "P90 Latency", "colorMode": null, "colors": [ "rgba(245, - 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #D", "thresholds": [], - "type": "number", "unit": "s" }, { "alias": "P99 Latency", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value - #E", "thresholds": [], "type": "number", "unit": "s" }, { "alias": "Success Rate", - "colorMode": "cell", "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, - 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #F", "thresholds": [ ".95", " 1.00" ], "type": "number", - "unit": "percentunit" }, { "alias": "Workload", "colorMode": null, "colors": [ - "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": - "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-workload=$__cell_2&var-namespace=$__cell_3", - "pattern": "destination_workload_var", "thresholds": [], "type": "number", "unit": - "short" }, { "alias": "Service", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": "$__cell dashboard", - "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", "pattern": - "destination_service", "thresholds": [], "type": "string", "unit": "short" }, - { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, - 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", - "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": [], - "type": "hidden", "unit": "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_requests_total{reporter=\"destination\", - response_code=\"200\"}[1m])) by (destination_workload, destination_workload_namespace, - destination_service), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "intervalFactor": 1, "legendFormat": "{{ destination_workload}}.{{ destination_workload_namespace - }}", "refId": "A" }, { "expr": "label_join(histogram_quantile(0.50, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload}}.{{ destination_workload_namespace }}", "refId": "B" - }, { "expr": "label_join(histogram_quantile(0.90, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "D" - }, { "expr": "label_join(histogram_quantile(0.99, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "E" - }, { "expr": "label_join((sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) by (destination_workload, destination_workload_namespace) - / sum(rate(istio_requests_total{reporter=\"destination\"}[1m])) by (destination_workload, - destination_workload_namespace)), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "interval": "", "intervalFactor": 1, "legendFormat": "{{ destination_workload - }}.{{ destination_workload_namespace }}", "refId": "F" } ], "timeFrom": null, - "title": "HTTP/GRPC Workloads", "transform": "table", "transparent": false, "type": - "table" }, { "columns": [], "datasource": "Prometheus", "fontSize": "100%", "gridPos": - { "h": 18, "w": 24, "x": 0, "y": 27 }, "hideTimeOverride": false, "id": 109, "links": - [], "pageSize": null, "repeatDirection": "v", "scroll": true, "showHeader": true, - "sort": { "col": 2, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": - false, "linkTargetBlank": false, "linkTooltip": "$__cell dashboard", "linkUrl": - "/dashboard/db/istio-tcp-workload-dashboard?var-namespace=$__cell_2&&var-workload=$__cell", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Bytes Sent", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [ "" ], "type": "number", "unit": "Bps" - }, { "alias": "Bytes Received", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #C", "thresholds": [], - "type": "number", "unit": "Bps" }, { "alias": "", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Time", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Workload", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_3&var-workload=$__cell_2", - "pattern": "destination_workload_var", "thresholds": [], "type": "string", "unit": - "short" }, { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Service", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", - "pattern": "destination_service", "thresholds": [], "type": "number", "unit": - "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_tcp_received_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "C" }, { "expr": "label_join(sum(rate(istio_tcp_sent_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "A" } ], "timeFrom": null, "title": "TCP - Workloads", "transform": "table", "transparent": false, "type": "table" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 24, "x": 0, "y": 45 }, "id": 111, "legend": - { "alignAsTable": false, "avg": false, "current": false, "max": false, "min": - false, "rightSide": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(istio_build) by (component, tag)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ component }}: {{ tag }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Istio Components by Version", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "transparent": - false, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Mesh - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml deleted file mode 100644 index 0d56502d7a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml +++ /dev/null @@ -1,150 +0,0 @@ -apiVersion: v1 -data: - istio-performance-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 12, "x": 0, "y": 0 }, "id": 2, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m])) - / (round(sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m])), 0.001)/1000)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "istio-ingressgateway", "refId": "B" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", - "refId": "C" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU / 1k rps", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 12, "y": 0 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-ingressgateway", - "refId": "B" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", "refId": - "C" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 0, "y": 9 }, "id": 4, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "(sum(container_memory_usage_bytes{pod_name=~\"istio-telemetry-.*\"}) / (sum(irate(istio_requests_total[1m])) - / 1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry - / 1k rps", "refId": "A" }, { "expr": "sum(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\"}) - / count(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\",container_name!=\"POD\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-ingressgateway", - "refId": "C" }, { "expr": "sum(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"}) - / count(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-proxy", - "refId": "B" }, { "expr": "(sum(container_memory_usage_bytes{pod_name=~\"istio-policy-.*\"}) - / (sum(irate(istio_requests_total[1m])) / 1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy - / 1k rps", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "decbytes", "label": - null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 9, "w": 12, "x": 12, "y": 9 }, "id": 5, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-telemetry\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-telemetry\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m]))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "istio-ingressgateway", "refId": "C" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_response_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m])) + sum(irate(istio_request_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_request_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m]))", "format": "time_series", "intervalFactor": 1, - "legendFormat": "istio-proxy", "refId": "D" }, { "expr": "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-policy\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-policy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "E" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Bytes transferred / sec", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 24, "x": 0, "y": 18 }, "id": 8, "legend": { "alignAsTable": false, "avg": - false, "current": false, "max": false, "min": false, "rightSide": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build) by (component, - tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ component - }}: {{ tag }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Istio Components by Version", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "transparent": false, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "The charts on this dashboard are intended to show Istio - main components cost in terms resources utilization under steady load.\n\n- **vCPU/1k - rps:** shows vCPU utilization by the main Istio components normalized by 1000 - requests/second. When idle or low traffic, this chart will be blank. The curve - for istio-proxy refers to the services sidecars only. \n- **vCPU:** vCPU utilization - by Istio components, not normalized.\n- **Memory:** memory footprint for the components. - Telemetry and policy are normalized by 1k rps, and no data is shown when there - is no traffic. For ingress and istio-proxy, the data is per instance. \n- **Bytes - transferred/ sec:** shows the number of bytes flowing through each Istio component.", - "gridPos": { "h": 4, "w": 24, "x": 0, "y": 18 }, "id": 11, "links": [], "mode": - "markdown", "title": "Istio Performance Dashboard Readme", "type": "text" } ], - "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": [] }, - "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Performance Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml deleted file mode 100644 index d39f3a822a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml +++ /dev/null @@ -1,795 +0,0 @@ -apiVersion: v1 -data: - istio-service-dashboard.json: "{ \"annotations\": { \"list\": [ { \"builtIn\": 1, - \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": true, \"iconColor\": - \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", \"type\": \"dashboard\" - } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": 0, \"iteration\": - 1536442501501, \"links\": [], \"panels\": [ { \"content\": \"
\\nSERVICE: $service\\n
\", \"gridPos\": { \"h\": - 3, \"w\": 24, \"x\": 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", - \"title\": \"\", \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": - null, \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"rgba(245, - 54, 54, 0.9)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": - \"Prometheus\", \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Client Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 3 }, \"id\": 14, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Client Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Client Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 3 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m]))\", \"format\": \"time_series\", \"hide\": - false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" } ], \"thresholds\": - \"\", \"title\": \"TCP Received Bytes\", \"transparent\": false, \"type\": \"singlestat\", - \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", - \"value\": \"null\" } ], \"valueName\": \"avg\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 7 }, \"id\": 97, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Server Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 7 }, \"id\": 98, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Server Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 7 }, \"id\": 99, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Server Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 7 }, \"id\": 100, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m])) \", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Sent Bytes\", \"transparent\": false, - \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": - \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" }, { - \"content\": \"
\\nCLIENT - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"source\\\",source_workload=~\\\"$srcwl\\\",source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"source\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace }} : - {{ response_code }}\", \"refId\": \"A\", \"step\": 2 } ], \"thresholds\": [], - \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Requests by Source - And Response Code\", \"tooltip\": { \"shared\": false, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": - [ { \"format\": \"ops\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"description\": \"\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 20 }, \"id\": - 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, \"rightSide\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 20 }, \"id\": - 68, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": - 80, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, - \"alignLevel\": null } }, { \"content\": \"
\\nSERVICE - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 32 }, \"id\": 69, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 35 }, \"id\": 90, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"destination\\\",destination_workload=~\\\"$dstwl\\\",destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace, response_code), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"destination\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[5m])) by (destination_workload, - destination_workload_namespace, response_code), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }}\", \"refId\": \"A\", - \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Incoming Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null - } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 12, \"y\": 35 }, \"id\": 91, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", - \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], - \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming - Success Rate (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 41 }, \"id\": 94, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 95, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 96, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 92, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace}} (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace}}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Bytes Received from - Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": - true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, - \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, \"alignLevel\": - null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 12, \"x\": 12, \"y\": 47 }, \"id\": 93, \"legend\": { \"avg\": false, \"current\": - false, \"max\": false, \"min\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } } ], \"refresh\": \"10s\", \"schemaVersion\": - 16, \"style\": \"dark\", \"tags\": [], \"templating\": { \"list\": [ { \"allValue\": - null, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": false, \"label\": - \"Service\", \"multi\": false, \"name\": \"service\", \"options\": [], \"query\": - \"label_values(destination_service)\", \"refresh\": 1, \"regex\": \"\", \"sort\": - 0, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", - \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": \"All\", - \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": - true, \"label\": \"Client Workload Namespace\", \"multi\": true, \"name\": \"srcns\", - \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (source_workload_namespace) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\"}) by (source_workload_namespace))\", \"refresh\": - 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": { \"text\": \"All\", \"value\": \"$__all\" - }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": - \"Client Workload\", \"multi\": true, \"name\": \"srcwl\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", source_workload_namespace=~\\\"$srcns\\\"}) - by (source_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload Namespace\", \"multi\": true, - \"name\": \"dstns\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (destination_workload_namespace) or - sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\"}) - by (destination_workload_namespace))\", \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", - \"sort\": 2, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload\", \"multi\": true, \"name\": - \"dstwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Service Dashboard\", \"uid\": \"LJ_uJAvmk\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-service-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml deleted file mode 100644 index a3022b2cab..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml +++ /dev/null @@ -1,744 +0,0 @@ -apiVersion: v1 -data: - istio-workload-dashboard.json: "{ \"__inputs\": [ { \"name\": \"DS_PROMETHEUS\", - \"label\": \"Prometheus\", \"description\": \"\", \"type\": \"datasource\", \"pluginId\": - \"prometheus\", \"pluginName\": \"Prometheus\" } ], \"__requires\": [ { \"type\": - \"grafana\", \"id\": \"grafana\", \"name\": \"Grafana\", \"version\": \"5.0.4\" - }, { \"type\": \"panel\", \"id\": \"graph\", \"name\": \"Graph\", \"version\": - \"5.0.0\" }, { \"type\": \"datasource\", \"id\": \"prometheus\", \"name\": \"Prometheus\", - \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"singlestat\", \"name\": - \"Singlestat\", \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"text\", - \"name\": \"Text\", \"version\": \"5.0.0\" } ], \"annotations\": { \"list\": [ - { \"builtIn\": 1, \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": - true, \"iconColor\": \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", - \"type\": \"dashboard\" } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": - 0, \"id\": null, \"iteration\": 1531345461465, \"links\": [], \"panels\": [ { - \"content\": \"
\\nWORKLOAD: - $workload.$namespace\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": - 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", \"title\": \"\", - \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 8, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Incoming Request Volume\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"current\" }, { \"cacheTimeout\": null, \"colorBackground\": false, - \"colorValue\": false, \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(245, 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", - \"decimals\": null, \"format\": \"percentunit\", \"gauge\": { \"maxValue\": 100, - \"minValue\": 80, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": - false }, \"gridPos\": { \"h\": 4, \"w\": 8, \"x\": 8, \"y\": 3 }, \"id\": 14, - \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": - \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 - } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": null, - \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Incoming Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 8, - \"x\": 16, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"interval\": \"\", \"intervalFactor\": 1, \"legendFormat\": - \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P90\", - \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P99\", - \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Request Duration\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"cacheTimeout\": null, - \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"#299c46\", - \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": - \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": - false, \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": - 0, \"y\": 7 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": - 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": - \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": - \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", - \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": \"null\", - \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": \"rgba(31, - 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", \"show\": - true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\"}[1m])) - + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\"}[1m]))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Server Traffic\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": - \"Prometheus\", \"format\": \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": 12, \"y\": 7 }, \"id\": 85, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\"}[1m])) + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\"}[1m]))\", - \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"\", \"refId\": \"A\" } ], \"thresholds\": \"\", \"title\": \"TCP Client Traffic\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"avg\" }, { \"content\": \"
\\nINBOUND - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - source_workload }}.{{ source_workload_namespace }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Requests by Source And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 20 }, \"id\": 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 8, \"x\": 16, \"y\": 20 }, \"id\": 68, \"legend\": { \"alignAsTable\": false, - \"avg\": false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": - false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": false - }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Response Size By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"decbytes\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", - \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, - \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": - 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": 80, \"legend\": - { \"avg\": false, \"current\": false, \"max\": false, \"min\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}} - (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"content\": - \"
\\nOUTBOUND SERVICES\\n
\", - \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": 32 }, \"id\": 69, \"links\": - [], \"mode\": \"html\", \"title\": \"\", \"transparent\": true, \"type\": \"text\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 0, \"y\": 35 }, \"id\": 70, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"max\": false, \"min\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null as zero\", \"percentage\": false, \"pointradius\": 5, - \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, - \"legendFormat\": \"{{ destination_service }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 35 }, \"id\": 71, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Outgoing Success Rate (non-5xx responses) By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"description\": \"\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 41 }, \"id\": 72, \"legend\": { \"alignAsTable\": - false, \"avg\": false, \"current\": false, \"hideEmpty\": true, \"hideZero\": - false, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": - false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": - false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Duration by Destination\", \"tooltip\": { - \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 73, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 74, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 76, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent on Outgoing TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 47 }, \"id\": - 78, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Received from Outgoing TCP Connection\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] } ], \"refresh\": - \"10s\", \"schemaVersion\": 16, \"style\": \"dark\", \"tags\": [], \"templating\": - { \"list\": [ { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", - \"hide\": 0, \"includeAll\": false, \"label\": \"Namespace\", \"multi\": false, - \"name\": \"namespace\", \"options\": [], \"query\": \"query_result(sum(istio_requests_total) - by (destination_workload_namespace) or sum(istio_tcp_sent_bytes_total) by (destination_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*_namespace=\\\"([^\\\"]*).*/\", \"sort\": 0, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": false, \"label\": \"Workload\", \"multi\": false, \"name\": - \"workload\", \"options\": [], \"query\": \"query_result((sum(istio_requests_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_requests_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)) or (sum(istio_tcp_sent_bytes_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 1, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": {}, \"datasource\": - \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": \"Inbound Workload - Namespace\", \"multi\": true, \"name\": \"srcns\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace) - or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Inbound Workload\", \"multi\": true, \"name\": - \"srcwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload))\", \"refresh\": - 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", \"sort\": 3, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Destination Service\", \"multi\": true, - \"name\": \"dstsvc\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service) or sum(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service))\", \"refresh\": 1, \"regex\": \"/.*destination_service=\\\"([^\\\"]*).*/\", - \"sort\": 4, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Workload Dashboard\", \"uid\": \"UbsSZTDik\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml deleted file mode 100644 index 9a7f42a256..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml +++ /dev/null @@ -1,359 +0,0 @@ -apiVersion: v1 -data: - mixer-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "limit": - 100, "name": "Annotations & Alerts", "showIn": 0, "type": "dashboard" } ] }, "editable": - false, "gnetId": null, "graphTooltip": 1, "id": null, "iteration": 1543881232533, - "links": [], "panels": [ { "content": "

Deployed Versions

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "40", "id": 62, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 3 }, "id": 64, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"mixer\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Mixer Versions", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "

Resource Usage

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(process_virtual_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "instant": false, "intervalFactor": 2, "legendFormat": - "Virtual Memory ({{ job }})", "refId": "I" }, { "expr": "sum(process_resident_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident - Memory ({{ job }})", "refId": "H" }, { "expr": "sum(go_memstats_heap_sys_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap sys ({{ job }})", "refId": "A" }, { "expr": "sum(go_memstats_heap_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap alloc ({{ job }})", "refId": "D" }, { "expr": "sum(go_memstats_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Alloc - ({{ job }})", "refId": "F" }, { "expr": "sum(go_memstats_heap_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "Heap in-use ({{ job }})", "refId": "E" }, { "expr": "sum(go_memstats_stack_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Stack - in-use ({{ job }})", "refId": "G" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (service)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "C" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Memory", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "bytes", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": 11 }, "id": 6, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (pod_name), \"service\", - \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "A" }, { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (container_name, pod_name), - \"service\", \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" }, { "expr": "sum(irate(process_cpu_seconds_total{job=~\"istio-telemetry|istio-policy\"}[1m])) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "{{ job }} (self-reported)", "refId": "C" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(process_open_fds{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "hide": true, "instant": false, "interval": "", "intervalFactor": - 2, "legendFormat": "Open FDs ({{ job }})", "refId": "A" }, { "expr": "sum(label_replace(container_fs_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "{{ service }} - {{ container_name - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Disk", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "decimals": null, "format": "none", - "label": "", "logBase": 1024, "max": null, "min": null, "show": false } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 7, "w": 6, "x": 18, "y": 11 }, "id": 4, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": false, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(go_goroutines{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines ({{ - job }})", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Mixer Overview

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 18 }, "height": "40px", "id": 30, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 0, "y": 21 }, "id": 9, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "mixer (Total)", - "refId": "B" }, { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m])) by (grpc_server_method)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "mixer ({{ grpc_server_method - }})", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Incoming Requests", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 6, "x": 6, "y": 21 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [ { - "alias": "{}", "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": - false, "targets": [ { "expr": "histogram_quantile(0.5, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.5", "refId": "B" }, { "expr": "histogram_quantile(0.9, - sum(rate(grpc_io_server_server_latency_bucket{}[1m])) by (grpc_server_method, - le))", "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ grpc_server_method - }} 0.9", "refId": "C" }, { "expr": "histogram_quantile(0.99, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.99", "refId": "D" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Response Durations", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "ms", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 12, "y": 21 }, "id": - 11, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(grpc_server_handled_total{grpc_code=~\"Unknown|Unimplemented|Internal|DataLoss\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Server Error Rate (5xx responses)", "tooltip": { - "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 18, "y": - 21 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(irate(grpc_server_handled_total{grpc_code!=\"OK\",grpc_service=~\".*Mixer\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Non-successes (4xxs)", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "content": - "

Adapters and Config

", "gridPos": { "h": 3, "w": 24, - "x": 0, "y": 27 }, "id": 28, "links": [], "mode": "html", "title": "", "transparent": - true, "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, - "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": - 12, "x": 0, "y": 30 }, "id": 13, "legend": { "avg": false, "current": false, "max": - false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(mixer_runtime_dispatches_total{adapter=~\"$adapter\"}[1m])) by (adapter)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ adapter }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Adapter Dispatch Count", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 30 }, "id": 14, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.5, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p50", "refId": "A" }, { "expr": "histogram_quantile(0.9, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p90 ", "refId": "B" }, { "expr": "histogram_quantile(0.99, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p99", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Adapter Dispatch Duration", "tooltip": { "shared": true, "sort": - 1, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "s", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 37 }, "id": 60, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "scalar(topk(1, max(mixer_config_rule_config_count) by - (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": "Rules", - "refId": "A" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Config Errors", "refId": "B" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_match_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Match Errors", "refId": "C" }, { "expr": "scalar(topk(1, max(mixer_config_unsatisfied_action_handler_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Unsatisfied Actions", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Rules", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 6, "y": 37 }, "id": 56, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_instance_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Instances", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Instances - in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 37 }, "id": 54, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_handler_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Handlers", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Handlers in - Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 18, "y": 37 }, "id": 58, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_attribute_count) by (configID)))", "format": - "time_series", "instant": false, "intervalFactor": 1, "legendFormat": "Attributes", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Attributes in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Individual Adapters

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 44 }, "id": 23, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 47 }, "id": 46, "panels": [], "repeat": - "adapter", "title": "$adapter Adapter", "type": "row" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 12, "x": 0, "y": 48 }, "id": 17, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(irate(mixer_runtime_dispatches_total{adapter=\"$adapter\"}[1m]),\"handler\", - \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ handler }} (error: {{ error }})", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Dispatch - Count By Handler", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 48 }, "id": 18, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(histogram_quantile(0.5, sum(rate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p50 - {{ handler_short - }} (error: {{ error }})", "refId": "A" }, { "expr": "label_replace(histogram_quantile(0.9, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p90 - {{ handler_short - }} (error: {{ error }})", "refId": "D" }, { "expr": "label_replace(histogram_quantile(0.99, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p99 - {{ handler_short - }} (error: {{ error }})", "refId": "E" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Dispatch Duration By Handler", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "s", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": - "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": - [ { "allValue": null, "current": {}, "datasource": "Prometheus", "hide": 0, "includeAll": - true, "label": "Adapter", "multi": true, "name": "adapter", "options": [], "query": - "label_values(adapter)", "refresh": 2, "regex": "", "sort": 1, "tagValuesQuery": - "", "tags": [], "tagsQuery": "", "type": "query", "useTags": false } ] }, "time": - { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", - "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ - "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Mixer Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-mixer-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml deleted file mode 100644 index 32987ba7de..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml +++ /dev/null @@ -1,307 +0,0 @@ -apiVersion: v1 -data: - pilot-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": - "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, "gnetId": - null, "graphTooltip": 1, "id": null, "links": [], "panels": [ { "content": "

Deployed - Versions

", "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": - "40", "id": 58, "links": [], "mode": "html", "title": "", "transparent": true, - "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": - false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": - 0, "y": 3 }, "id": 56, "legend": { "avg": false, "current": false, "max": false, - "min": false, "show": true, "total": false, "values": false }, "lines": true, - "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": - 5, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": - 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build{component=\"pilot\"}) - by (tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ tag - }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Pilot Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Resource Usage

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "process_virtual_memory_bytes{job=\"pilot\"}", "format": - "time_series", "instant": false, "intervalFactor": 2, "legendFormat": "Virtual - Memory", "refId": "I", "step": 2 }, { "expr": "process_resident_memory_bytes{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", - "refId": "H", "step": 2 }, { "expr": "go_memstats_heap_sys_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - sys", "refId": "A" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - alloc", "refId": "D" }, { "expr": "go_memstats_alloc_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F", "step": - 2 }, { "expr": "go_memstats_heap_inuse_bytes{job=\"pilot\"}", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": "E", - "step": 2 }, { "expr": "go_memstats_stack_inuse_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "G", - "step": 2 }, { "expr": "sum(container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"})", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "Total (k8s)", "refId": "C", "step": 2 }, { "expr": "container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B", "step": 2 } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Memory", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "bytes", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": - 11 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m]))", "format": "time_series", "hide": false, - "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": "A", "step": 2 }, - { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m])) by (container_name)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", - "refId": "B", "step": 2 }, { "expr": "irate(process_cpu_seconds_total{job=\"pilot\"}[1m])", - "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "pilot - (self-reported)", "refId": "C", "step": 2 } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"pilot\"}", "format": "time_series", "hide": true, "instant": - false, "interval": "", "intervalFactor": 2, "legendFormat": "Open FDs (pilot)", - "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }}", "refId": "B", "step": 2 } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "bytes", "label": "", "logBase": 1, "max": null, "min": null, "show": - true }, { "decimals": null, "format": "none", "label": "", "logBase": 1024, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 18, "y": - 11 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": false, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines", - "refId": "A", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

xDS

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 18 }, "id": 28, "links": [], "mode": "html", "title": - "", "transparent": true, "type": "text" }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 6, "w": 8, "x": 0, "y": 21 }, "id": 40, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 1, "legendFormat": "XDS GRPC Successes", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Updates", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "round(sum(rate(envoy_cluster_update_attempt{cluster_name=\"xds-grpc\"}[1m])) - - sum(rate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m])))", "format": - "time_series", "intervalFactor": 2, "legendFormat": "XDS GRPC ", "refId": "A", - "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Failures", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 21 }, "id": 41, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(envoy_cluster_upstream_cx_active{cluster_name=\"xds-grpc\"})", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Pilot (XDS GRPC)", "refId": - "C", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Active Connections", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 8, "x": 0, "y": 27 }, "id": 45, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "pilot_conflict_inbound_listener{job=\"pilot\"}", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Inbound Listeners", "refId": "B" }, { "expr": "pilot_conflict_outbound_listener_http_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (http over current tcp)", "refId": "A" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current tcp)", "refId": "C" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_http{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current http)", "refId": "D" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Conflicts", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 8, "y": 27 }, "id": 47, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "pilot_virt_services{job=\"pilot\"}", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Virtual Services", "refId": "A" }, { "expr": - "pilot_services{job=\"pilot\"}", "format": "time_series", "intervalFactor": 1, - "legendFormat": "Services", "refId": "B" }, { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "hide": true, "intervalFactor": 1, "legendFormat": "Rejected CDS Configs - {{ - node }}: {{ err }}", "refId": "C" }, { "expr": "pilot_xds_eds_reject{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 1, "legendFormat": "Rejected - EDS Configs", "refId": "D" }, { "expr": "pilot_xds{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Connected Endpoints", "refId": - "E" }, { "expr": "rate(pilot_xds_write_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Write Timeouts", "refId": - "F" }, { "expr": "rate(pilot_xds_push_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Push Timeouts", "refId": - "G" }, { "expr": "rate(pilot_xds_pushes{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Pushes ({{ type }})", "refId": "H" }, { - "expr": "rate(pilot_xds_push_errors{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Push Errors ({{ type }})", "refId": "I" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "ADS Monitoring", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 16, "y": - 27 }, "id": 49, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{ err }})", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected CDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 0, "y": 35 }, "id": 52, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_eds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected EDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 8, "y": - 35 }, "id": 54, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_lds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected LDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 16, "y": 35 }, "id": 53, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_rds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected RDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": { "outbound|80||default-http-backend.kube-system.svc.cluster.local": - "rgba(255, 255, 255, 0.97)" }, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 0, "y": - 42 }, "id": 51, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [ { "alias": "outbound|80||default-http-backend.kube-system.svc.cluster.local", - "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": - [ { "expr": "sum(pilot_xds_eds_instances{job=\"pilot\"}) by (cluster)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ cluster }}", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "EDS - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Pilot - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-pilot-dashboard - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml deleted file mode 100644 index 6329dad866..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - apiVersion: authentication.istio.io/v1alpha1 - kind: Policy - metadata: - name: grafana-ports-mtls-disabled - namespace: istio-system - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - targets: - - name: grafana - ports: - - number: 3000 - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-custom-resources - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml deleted file mode 100644 index 251c4e2669..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -data: - dashboardproviders.yaml: | - apiVersion: 1 - providers: - - disableDeletion: false - folder: istio - name: istio - options: - path: /var/lib/grafana/dashboards/istio - orgId: 1 - type: file - datasources.yaml: | - apiVersion: 1 - datasources: - - access: proxy - editable: true - isDefault: true - jsonData: - timeInterval: 5s - name: Prometheus - orgId: 1 - type: prometheus - url: http://prometheus:9090 -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 337758a25f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - chart: security - heritage: Tiller - release: istio - spec: - peers: - - mtls: - mode: PERMISSIVE - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index 03832c4720..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: v1 -data: - config: "policy: enabled\ntemplate: |-\n rewriteAppHTTPProbe: false\n initContainers:\n - \ [[ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"NONE\" ]]\n - name: istio-init\n image: \"docker.io/istio/proxy_init:1.1.6\"\n - \ args:\n - \"-p\"\n - [[ .MeshConfig.ProxyListenPort ]]\n - \"-u\"\n - \ - 1337\n - \"-m\"\n - [[ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` - .ProxyConfig.InterceptionMode ]]\n - \"-i\"\n - \"[[ annotation .ObjectMeta - `traffic.sidecar.istio.io/includeOutboundIPRanges` \"*\" ]]\"\n - \"-x\"\n - \ - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` - \ \"\" ]]\"\n - \"-b\"\n - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` - (includeInboundPorts .Spec.Containers) ]]\"\n - \"-d\"\n - \"[[ excludeInboundPort - (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 ) (annotation .ObjectMeta - `traffic.sidecar.istio.io/excludeInboundPorts` \"\" ) ]]\"\n [[ if (isset - .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -]]\n - - \"-k\"\n - \"[[ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` - ]]\"\n [[ end -]]\n imagePullPolicy: IfNotPresent\n resources:\n requests:\n - \ cpu: 10m\n memory: 10Mi\n limits:\n cpu: 100m\n memory: - 50Mi\n securityContext:\n runAsUser: 0\n runAsNonRoot: false\n capabilities:\n - \ add:\n - NET_ADMIN\n restartPolicy: Always\n [[ end -]]\n containers:\n - \ - name: istio-proxy\n image: [[ annotation .ObjectMeta `sidecar.istio.io/proxyImage` - \ \"docker.io/istio/proxyv2:1.1.6\" ]]\n ports:\n - containerPort: 15090\n - \ protocol: TCP\n name: http-envoy-prom\n args:\n - proxy\n - - sidecar\n - --domain\n - $(POD_NAMESPACE).svc.cluster.local\n - --configPath\n - \ - [[ .ProxyConfig.ConfigPath ]]\n - --binaryPath\n - [[ .ProxyConfig.BinaryPath - ]]\n - --serviceCluster\n [[ if ne \"\" (index .ObjectMeta.Labels \"app\") - -]]\n - [[ index .ObjectMeta.Labels \"app\" ]].$(POD_NAMESPACE)\n [[ else - -]]\n - [[ valueOrDefault .DeploymentMeta.Name \"istio-proxy\" ]].[[ valueOrDefault - .DeploymentMeta.Namespace \"default\" ]]\n [[ end -]]\n - --drainDuration\n - \ - [[ formatDuration .ProxyConfig.DrainDuration ]]\n - --parentShutdownDuration\n - \ - [[ formatDuration .ProxyConfig.ParentShutdownDuration ]]\n - --discoveryAddress\n - \ - [[ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress - ]]\n - --zipkinAddress\n - [[ .ProxyConfig.GetTracing.GetZipkin.GetAddress - ]]\n - --connectTimeout\n - [[ formatDuration .ProxyConfig.ConnectTimeout - ]]\n - --proxyAdminPort\n - [[ .ProxyConfig.ProxyAdminPort ]]\n [[ if - gt .ProxyConfig.Concurrency 0 -]]\n - --concurrency\n - [[ .ProxyConfig.Concurrency - ]]\n [[ end -]]\n - --controlPlaneAuthPolicy\n - [[ annotation .ObjectMeta - `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy - ]]\n [[- if (ne (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 - ) \"0\") ]]\n - --statusPort\n - [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n - --applicationPorts\n - \"[[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` - (applicationPorts .Spec.Containers) ]]\"\n [[- end ]]\n env:\n - name: - POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - \ - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: - metadata.namespace\n - name: INSTANCE_IP\n valueFrom:\n fieldRef:\n - \ fieldPath: status.podIP\n \n - name: ISTIO_META_POD_NAME\n valueFrom:\n - \ fieldRef:\n fieldPath: metadata.name\n - name: ISTIO_META_CONFIG_NAMESPACE\n - \ valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - \ - name: ISTIO_META_INTERCEPTION_MODE\n value: [[ or (index .ObjectMeta.Annotations - \"sidecar.istio.io/interceptionMode\") .ProxyConfig.InterceptionMode.String ]]\n - \ [[ if .ObjectMeta.Annotations ]]\n - name: ISTIO_METAJSON_ANNOTATIONS\n - \ value: |\n [[ toJSON .ObjectMeta.Annotations ]]\n [[ end - ]]\n [[ if .ObjectMeta.Labels ]]\n - name: ISTIO_METAJSON_LABELS\n value: - |\n [[ toJSON .ObjectMeta.Labels ]]\n [[ end ]]\n [[- if (isset - .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) ]]\n - name: - ISTIO_BOOTSTRAP_OVERRIDE\n value: \"/etc/istio/custom-bootstrap/custom_bootstrap.json\"\n - \ [[- end ]]\n imagePullPolicy: IfNotPresent\n [[ if (ne (annotation .ObjectMeta - `status.sidecar.istio.io/port` 15020 ) \"0\") ]]\n readinessProbe:\n httpGet:\n - \ path: /healthz/ready\n port: [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n initialDelaySeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` - \ 1 ]]\n periodSeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` - \ 2 ]]\n failureThreshold: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` - \ 30 ]]\n [[ end -]]securityContext:\n readOnlyRootFilesystem: true\n - \ [[ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"TPROXY\" -]]\n capabilities:\n add:\n - NET_ADMIN\n runAsGroup: - 1337\n [[ else -]]\n \n runAsUser: 1337\n [[- end ]]\n resources:\n - \ [[ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset - .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -]]\n requests:\n - \ [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -]]\n - \ cpu: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` ]]\"\n - \ [[ end ]]\n [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) - -]]\n memory: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` - ]]\"\n [[ end ]]\n [[ else -]]\n limits:\n cpu: 2000m\n - \ memory: 128Mi\n requests:\n cpu: 10m\n memory: 40Mi\n - \ \n [[ end -]]\n volumeMounts:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - mountPath: /etc/istio/custom-bootstrap\n - \ name: custom-bootstrap-volume\n [[- end ]]\n - mountPath: /etc/istio/proxy\n - \ name: istio-envoy\n - mountPath: /etc/certs/\n name: istio-certs\n - \ readOnly: true\n [[- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` - ]]\n [[ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 4 ]]\n [[ - end ]]\n [[- end ]]\n volumes:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - name: custom-bootstrap-volume\n - \ configMap:\n name: [[ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` - `` ]]\n [[- end ]]\n - emptyDir:\n medium: Memory\n name: istio-envoy\n - \ - name: istio-certs\n secret:\n optional: true\n [[ if eq .Spec.ServiceAccountName - \"\" -]]\n secretName: istio.default\n [[ else -]]\n secretName: - [[ printf \"istio.%s\" .Spec.ServiceAccountName ]]\n [[ end -]]\n [[- - if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` ]]\n [[ range - $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 2 ]]\n [[ end - ]]\n [[ end ]]" -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index be0ffff1af..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - mesh: "# Set the following variable to true to disable policy checks by the Mixer.\n# - Note that metrics will still be reported to the Mixer.\ndisablePolicyChecks: false\n\n# - Set enableTracing to false to disable request tracing.\nenableTracing: true\n\n# - Set accessLogFile to empty string to disable access log.\naccessLogFile: \"/dev/stdout\"\n\n# - If accessLogEncoding is TEXT, value will be used directly as the log format\n# - example: \"[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\\n\"\n# - If AccessLogEncoding is JSON, value will be parsed as map[string]string\n# example: - '{\"start_time\": \"%START_TIME%\", \"req_method\": \"%REQ(:METHOD)%\"}'\n# Leave - empty to use default log format\naccessLogFormat: \"\"\n\n# Set accessLogEncoding - to JSON or TEXT to configure sidecar access log\naccessLogEncoding: 'TEXT'\nmixerCheckServer: - istio-policy.istio-system.svc.cluster.local:9091\nmixerReportServer: istio-telemetry.istio-system.svc.cluster.local:9091\n# - policyCheckFailOpen allows traffic in cases when the mixer policy service cannot - be reached.\n# Default is false which means the traffic is denied when the client - is unable to connect to Mixer.\npolicyCheckFailOpen: false\n# Let Pilot give ingresses - the public IP of the Istio ingressgateway\ningressService: istio-ingressgateway\n\n# - Default connect timeout for dynamic clusters generated by Pilot and returned via - XDS\nconnectTimeout: 10s\n\n# DNS refresh rate for Envoy clusters of type STRICT_DNS\ndnsRefreshRate: - 5s\n\n# Unix Domain Socket through which envoy communicates with NodeAgent SDS - to get\n# key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - \nsdsUdsPath: \n\n# This flag is used by secret discovery service(SDS). \n# If - set to true(prerequisite: https://kubernetes.io/docs/concepts/storage/volumes/#projected), - Istio will inject volumes mount \n# for k8s service account JWT, so that K8s API - server mounts k8s service account JWT to envoy container, which \n# will be used - to generate key/cert eventually. This isn't supported for non-k8s case.\nenableSdsTokenMount: - false\n\n# This flag is used by secret discovery service(SDS). \n# If set to true, - envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token' - \n# (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod) - \n# and pass to sds server, which will be used to request key/cert eventually. - \n# this flag is ignored if enableSdsTokenMount is set.\n# This isn't supported - for non-k8s case.\nsdsUseK8sSaJwt: false\n\n# The trust domain corresponds to - the trust root of a system.\n# Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain\ntrustDomain: - \n\n# Set the default behavior of the sidecar for handling outbound traffic from - the application:\n# ALLOW_ANY - outbound traffic to unknown destinations will - be allowed, in case there are no\n# services or ServiceEntries for the destination - port\n# REGISTRY_ONLY - restrict outbound traffic to services defined in the service - registry as well\n# as those defined through ServiceEntries \noutboundTrafficPolicy:\n - \ mode: ALLOW_ANY\n\nlocalityLbSetting:\n {}\n \n\n# The namespace to treat - as the administrative root namespace for istio\n# configuration. \nrootNamespace: - istio-system\nconfigSources:\n- address: istio-galley.istio-system.svc:9901\n\ndefaultConfig:\n - \ #\n # TCP connection timeout between Envoy & the application, and between Envoys. - \ Used for static clusters\n # defined in Envoy's configuration file\n connectTimeout: - 10s\n #\n ### ADVANCED SETTINGS #############\n # Where should envoy's configuration - be stored in the istio-proxy container\n configPath: \"/etc/istio/proxy\"\n binaryPath: - \"/usr/local/bin/envoy\"\n # The pseudo service name used for Envoy.\n serviceCluster: - istio-proxy\n # These settings that determine how long an old Envoy\n # process - should be kept alive after an occasional reload.\n drainDuration: 45s\n parentShutdownDuration: - 1m0s\n #\n # The mode used to redirect inbound connections to Envoy. This setting\n - \ # has no effect on outbound traffic: iptables REDIRECT is always used for\n - \ # outbound connections.\n # If \"REDIRECT\", use iptables REDIRECT to NAT and - redirect to Envoy.\n # The \"REDIRECT\" mode loses source addresses during redirection.\n - \ # If \"TPROXY\", use iptables TPROXY to redirect to Envoy.\n # The \"TPROXY\" - mode preserves both the source and destination IP\n # addresses and ports, so - that they can be used for advanced filtering\n # and manipulation.\n # The \"TPROXY\" - mode also configures the sidecar to run with the\n # CAP_NET_ADMIN capability, - which is required to use TPROXY.\n #interceptionMode: REDIRECT\n #\n # Port - where Envoy listens (on local host) for admin commands\n # You can exec into - the istio-proxy container in a pod and\n # curl the admin port (curl http://localhost:15000/) - to obtain\n # diagnostic information from Envoy. See\n # https://lyft.github.io/envoy/docs/operations/admin.html\n - \ # for more details\n proxyAdminPort: 15000\n #\n # Set concurrency to a specific - number to control the number of Proxy worker threads.\n # If set to 0 (default), - then start worker thread for each CPU thread/core.\n concurrency: 2\n #\n tracing:\n - \ zipkin:\n # Address of the Zipkin collector\n address: zipkin.istio-system:9411\n - \ #\n # Mutual TLS authentication between sidecars and istio control plane.\n - \ controlPlaneAuthPolicy: NONE\n #\n # Address where istio Pilot service is - running\n discoveryAddress: istio-pilot.istio-system:15010" - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - release: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml deleted file mode 100644 index ec52e4be53..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "istio_namespace: istio-system\nserver:\n port: 20001\nexternal_services:\n - \ istio:\n url_service_version: http://istio-pilot:8080/version\n jaeger:\n - \ url: \n grafana:\n url: \n" -kind: ConfigMap -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index 1a06e2ff6c..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,313 +0,0 @@ -apiVersion: v1 -data: - prometheus.yml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - metric_relabel_configs: - # Exclude some of the envoy metrics that have massive cardinality - # This list may need to be pruned further moving forward, as informed - # by performance and scalability testing. - - source_labels: [ cluster_name ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ tcp_prefix ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ listener_address ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_listener_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tls.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tcp_downstream.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_http_(stats|admin).*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_cluster_(lb|retry|bind|internal|max|original).*' - action: drop - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 072bd0fd7a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - istio-injection: disabled - name: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml deleted file mode 100644 index c96321c013..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - passphrase: YWRtaW4= - username: YWRtaW4= -kind: Secret -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -type: Opaque diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml deleted file mode 100644 index ddc7dbff72..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - ports: - - name: http - port: 3000 - protocol: TCP - targetPort: 3000 - selector: - app: grafana - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 4215ecb031..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml deleted file mode 100644 index 4998a7f877..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - - name: https - port: 443 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-egressgateway - istio: egressgateway - release: istio - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index e037f828d3..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index 5833ac81fa..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - release: istio - type: NodePort diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 20b0a6b506..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 31ff71c40b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 877561ec4a..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - port: 443 - selector: - istio: sidecar-injector diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index eebbbe6978..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml deleted file mode 100644 index 1dfd5cd653..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: agent-service - release: istio - name: jaeger-agent - namespace: istio-system -spec: - clusterIP: None - ports: - - name: agent-zipkin-thrift - port: 5775 - protocol: UDP - targetPort: 5775 - - name: agent-compact - port: 6831 - protocol: UDP - targetPort: 6831 - - name: agent-binary - port: 6832 - protocol: UDP - targetPort: 6832 - selector: - app: jaeger diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml deleted file mode 100644 index 5f4aeccfb5..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: collector-service - release: istio - name: jaeger-collector - namespace: istio-system -spec: - ports: - - name: jaeger-collector-tchannel - port: 14267 - protocol: TCP - targetPort: 14267 - - name: jaeger-collector-http - port: 14268 - protocol: TCP - targetPort: 14268 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml deleted file mode 100644 index 94a9e9d15b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: jaeger-service - release: istio - name: jaeger-query - namespace: istio-system -spec: - ports: - - name: query-http - port: 16686 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml deleted file mode 100644 index 049f4c74d7..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - ports: - - name: http-kiali - port: 20001 - protocol: TCP - selector: - app: kiali diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index f0ecb03d63..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml deleted file mode 100644 index 973e98032f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: null - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: tracing - namespace: istio-system -spec: - ports: - - name: http-query - port: 80 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml deleted file mode 100644 index 43acf02148..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: zipkin - namespace: istio-system -spec: - ports: - - name: http - port: 9411 - protocol: TCP - targetPort: 9411 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index 8cf250f0d0..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml deleted file mode 100644 index ab525f7ced..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml deleted file mode 100644 index 5581b918c1..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index adb8c1a617..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml deleted file mode 100644 index 94a0b1f0ac..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index ad9a81526f..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index c0c452e957..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index e6b9404cda..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index c844263f93..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index e40f71183b..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml deleted file mode 100644 index 6a40ec8143..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 2ad4d98808..0000000000 --- a/tests/stacks/kubernetes/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/istio/kustomize_test.go b/tests/stacks/kubernetes/application/istio/kustomize_test.go deleted file mode 100644 index 2a73876563..0000000000 --- a/tests/stacks/kubernetes/application/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 426f7f76c3..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "ON" diff --git a/tests/stacks/kubernetes/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml b/tests/stacks/kubernetes/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml deleted file mode 100644 index 67b828a5ee..0000000000 --- a/tests/stacks/kubernetes/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "ON" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-parameters-797cg68672 - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/oidc-authservice/kustomize_test.go b/tests/stacks/kubernetes/application/oidc-authservice/kustomize_test.go deleted file mode 100644 index 79b7818e58..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package oidc_authservice - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/oidc-authservice", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml deleted file mode 100644 index d9c3eddc26..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/app.k8s.io_v1beta1_application_oidc-authservice.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice - namespace: istio-system -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: StatefulSet - - group: core - kind: Service - - group: core - kind: PersistentVolumeClaim - - group: networking.istio.io - kind: EnvoyFilter - descriptor: - description: Provides OIDC-based authentication for Kubeflow Applications, at - the Istio Gateway. - keywords: - - oidc - - authservice - - authentication - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/oidc-authservice - - description: Docs - url: https://www.kubeflow.org/docs/started/k8s/kfctl-existing-arrikto - maintainers: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - owners: - - email: yanniszark@arrikto.com - name: Yannis Zarkadas - type: oidc-authservice - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/instance: oidc-authservice-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: oidc-authservice - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml deleted file mode 100644 index 011c05c390..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/apps_v1_statefulset_authservice.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - serviceName: authservice - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - spec: - containers: - - env: - - name: USERID_HEADER - value: kubeflow-userid - - name: USERID_PREFIX - value: "" - - name: USERID_CLAIM - value: email - - name: OIDC_PROVIDER - value: http://dex.auth.svc.cluster.local:5556/dex - - name: OIDC_AUTH_URL - value: /dex/auth - - name: OIDC_SCOPES - value: profile email groups - - name: REDIRECT_URL - value: /login/oidc - - name: SKIP_AUTH_URI - value: /dex - - name: PORT - value: "8080" - - name: CLIENT_ID - value: kubeflow-oidc-authservice - - name: CLIENT_SECRET - value: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - - name: STORE_PATH - value: /var/lib/authservice/data.db - image: gcr.io/arrikto/kubeflow/oidc-authservice:28c59ef - imagePullPolicy: Always - name: authservice - ports: - - containerPort: 8080 - name: http-api - readinessProbe: - httpGet: - path: / - port: 8081 - volumeMounts: - - mountPath: /var/lib/authservice - name: data - securityContext: - fsGroup: 111 - volumes: - - name: data - persistentVolumeClaim: - claimName: authservice-pvc diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml deleted file mode 100644 index 510e1df10f..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/networking.istio.io_v1alpha3_envoyfilter_authn-filter.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: EnvoyFilter -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authn-filter - namespace: istio-system -spec: - filters: - - filterConfig: - httpService: - authorizationRequest: - allowedHeaders: - patterns: - - exact: cookie - - exact: X-Auth-Token - authorizationResponse: - allowedUpstreamHeaders: - patterns: - - exact: kubeflow-userid - serverUri: - cluster: outbound|8080||authservice.istio-system.svc.cluster.local - failureModeAllow: false - timeout: 10s - uri: http://authservice.istio-system.svc.cluster.local - statusOnError: - code: GatewayTimeout - filterName: envoy.ext_authz - filterType: HTTP - insertPosition: - index: FIRST - listenerMatch: - listenerType: GATEWAY - workloadLabels: - istio: ingressgateway diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml deleted file mode 100644 index c3193ba74b..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_configmap_oidc-authservice-parameters.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -data: - application_secret: pUBnBOY80SnXgjibTYM9ZWNzY2xreNGQok - client_id: kubeflow-oidc-authservice - gatewaySelector: ingressgateway - namespace: istio-system - oidc_auth_url: /dex/auth - oidc_provider: http://dex.auth.svc.cluster.local:5556/dex - oidc_redirect_uri: /login/oidc - skip_auth_uri: /dex - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: oidc-authservice-parameters - namespace: istio-system diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml deleted file mode 100644 index 7496a46ef8..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_persistentvolumeclaim_authservice-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice-pvc - namespace: istio-system -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml b/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml deleted file mode 100644 index 0884d424a4..0000000000 --- a/tests/stacks/kubernetes/application/oidc-authservice/test_data/expected/~g_v1_service_authservice.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - name: authservice - namespace: istio-system -spec: - ports: - - name: http-authservice - port: 8080 - targetPort: http-api - publishNotReadyAddresses: true - selector: - app: authservice - app.kubernetes.io/component: oidc-authservice - app.kubernetes.io/name: oidc-authservice - type: ClusterIP diff --git a/tests/stacks/kubernetes/application/spark-operator/kustomize_test.go b/tests/stacks/kubernetes/application/spark-operator/kustomize_test.go deleted file mode 100644 index 635369815e..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spark_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/spark-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index ddd151fa47..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2550 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: scheduledsparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: ScheduledSparkApplication - listKind: ScheduledSparkApplicationList - plural: scheduledsparkapplications - shortNames: - - scheduledsparkapp - singular: scheduledsparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - concurrencyPolicy: - type: string - failedRunHistoryLimit: - format: int32 - type: integer - schedule: - type: string - successfulRunHistoryLimit: - format: int32 - type: integer - suspend: - type: boolean - template: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - schedule - - template - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index bf9aacd2ff..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2532 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: sparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: SparkApplication - listKind: SparkApplicationList - plural: sparkapplications - shortNames: - - sparkapp - singular: sparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml deleted file mode 100644 index 47bbe36a1d..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - name: spark-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: SparkOperator - descriptor: - description: Spark-operator allows users to create and manage the "SparkApplication" - custom resource. - keywords: - - spark - maintainers: - - email: holden@pigscanfly.ca - name: Holden Karau - owners: - - email: holden@pigscanfly.ca - name: Holden Karau - type: spark-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: sppark-operator - app.kubernetes.io/instance: spark-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml deleted file mode 100644 index 8f9cf52035..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - strategy: - type: Recreate - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "10254" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/version: v1beta2-1.1.0-2.4.5 - kustomize.component: spark-operator - spec: - containers: - - args: - - -v=2 - - -namespace= - - -ingress-url-format= - - -controller-threads=10 - - -resync-interval=30 - - -logtostderr - - -enable-metrics=true - - -metrics-labels=app_type - - -metrics-port=10254 - - -metrics-endpoint=/metrics - - -metrics-prefix= - image: gcr.io/spark-operator/spark-operator:v1beta2-1.1.0-2.4.5 - imagePullPolicy: IfNotPresent - name: sparkoperator - ports: - - containerPort: 10254 - serviceAccountName: spark-operatoroperator-sa diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml deleted file mode 100644 index 8f7eabad51..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-cr -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - '*' -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - create - - get - - delete - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - create - - get - - delete -- apiGroups: - - "" - resources: - - nodes - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - create - - update - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get - - update - - delete -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - get - - update - - delete -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - - scheduledsparkapplications - - sparkapplications/status - - scheduledsparkapplications/status - verbs: - - '*' diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml deleted file mode 100644 index 7b3d77da27..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorsparkoperator-crb -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spark-operatoroperator-cr -subjects: -- kind: ServiceAccount - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml deleted file mode 100644 index e4a3af18c1..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml deleted file mode 100644 index ed9bb0d46e..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: spark-operatorspark-role -subjects: -- kind: ServiceAccount - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml deleted file mode 100644 index b089a63b4c..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml b/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml deleted file mode 100644 index eb83084001..0000000000 --- a/tests/stacks/kubernetes/application/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/name: sparkoperator - kustomize.component: spark-operator - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spartakus/kustomize_test.go b/tests/stacks/kubernetes/application/spartakus/kustomize_test.go deleted file mode 100644 index 3bc837d0cd..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spartakus - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/kubernetes/application/spartakus", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 531fe0dac7..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 6a4c558264..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index f2e0bb974d..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index 9cad7bb143..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index 8572b43906..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - usageId: -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index be719e7753..0000000000 --- a/tests/stacks/kubernetes/application/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/name: spartakus - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/stacks/kubernetes/kustomize_test.go b/tests/stacks/kubernetes/kustomize_test.go deleted file mode 100644 index 09e034d427..0000000000 --- a/tests/stacks/kubernetes/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kubernetes - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/kubernetes", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index 2879750ea8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/admission-webhook-cert - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d75200e308..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 9fee938c58..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml deleted file mode 100644 index f59db66ec0..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mpijobs.kubeflow.org.yaml +++ /dev/null @@ -1,156 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpijobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MPIJob - plural: mpijobs - shortNames: - - mj - - mpij - singular: mpijob - scope: Namespaced - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - properties: - spec: - description: Only one of gpus, processingUnits, or replicas should be - specified - oneOf: - - properties: - gpus: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of GPUs - gpusPerNode: - description: Defaults to the number of GPUs per worker - minimum: 1 - title: The maximum number of GPUs available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - gpus - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - processingUnits: - description: Valid values are 1, 2, 4, or any multiple of 8 - oneOf: - - enum: - - 1 - - 2 - - 4 - type: integer - - minimum: 8 - multipleOf: 8 - type: integer - title: Total number of processing units - processingUnitsPerNode: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The maximum number of processing units available per node - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - processingUnits - - properties: - processingResourceType: - description: Defaults to 'nvidia.com/gpu' - enum: - - nvidia.com/gpu - - cpu - title: The processing resource type, e.g. 'nvidia.com/gpu' or 'cpu' - type: string - replicas: - description: The processing resource limit should be specified for - each replica - minimum: 1 - title: Total number of replicas - type: integer - slotsPerWorker: - description: Defaults to the number of processing units per worker - minimum: 1 - title: The number of slots per worker used in hostfile - type: integer - required: - - replicas - title: The MPIJob spec - served: false - storage: false - - name: v1alpha2 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: false - - name: v1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - mpiReplicaSpecs: - properties: - Launcher: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - slotsPerWorker: - minimum: 1 - type: integer - served: true - storage: true diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml deleted file mode 100644 index cdb2b4d628..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_mxjobs.kubeflow.org.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxjobs.kubeflow.org -spec: - group: kubeflow.org - names: - kind: MXJob - plural: mxjobs - singular: mxjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - mxReplicaSpecs: - properties: - Scheduler: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Server: - properties: - replicas: - minimum: 1 - type: integer - Tuner: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - TunerServer: - properties: - replicas: - minimum: 1 - type: integer - TunerTracker: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - version: v1 diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 808eb4db0c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index 206664d781..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: networking.istio.io/v1alpha3 - kind: DestinationRule - - group: rbac.istio.io/v1alpha1 - kind: ServiceRoleBinding - - group: rbac.istio.io/v1alpha1 - kind: ServiceRole - - group: metacontroller.k8s.io/v1alpha1 - kind: CompositeController - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml deleted file mode 100644 index 1ccc57b61d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mpi-operator.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MPIJob - descriptor: - description: Mpi-operator allows users to create and manage the "MPIJob" custom - resource. - keywords: - - mpijob - - mpi-operator - links: - - description: About - url: https://github.com/kubeflow/mpi-operator - maintainers: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: stp.abhi@gmail.com - name: Abhilash Pallerlamudi - owners: - - email: rong.ou@gmail.com - name: Rong Ou - - email: terrytangyuan@gmail.com - name: Yuan Tang - type: mpi-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/instance: mpi-operator - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mpi-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml deleted file mode 100644 index 328aafbc81..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mxnet-operator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: MXJob - descriptor: - description: mxnet-operator allows users to create and manage the "MXJob" custom - resource. - keywords: - - MXjob - - mxnet-operator - - mxnet-training - links: - - description: About - url: https://github.com/kubeflow/mxnet-operator - maintainers: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - owners: - - email: suleisl2000@hotmail.com - name: Lei Su - - email: terrytangyuan@gmail.com - name: Yuan Tang - - email: seedjeffwan@gmail.com - name: Jiaxin Shan - type: mxnet-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/instance: mxnet-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: mxnet-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index b2d2db5067..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index a1d50727d2..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - spec: - containers: - - args: - - --tlsCertFile=/etc/webhook/certs/tls.crt - - --tlsKeyFile=/etc/webhook/certs/tls.key - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index 9d5bbcd218..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 754f9eab51..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index f737f8edc9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - name: config-volume diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 4bbc9d3fbf..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index e92ff7c8c4..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,76 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index b75fea4af9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - command: - - python - - /hooks/sync.py - env: - - name: KFP_VERSION - valueFrom: - configMapKeyRef: - key: appVersion - name: pipeline-upstream-install-config-d7hkh24mdg - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - image: python:3.7 - name: profile-controller - ports: - - containerPort: 80 - volumeMounts: - - mountPath: /hooks - name: hooks - volumes: - - configMap: - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - name: hooks diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 749bc40837..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 8860476d6e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - value: "" - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e88e10832a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 93dfff37b1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 98db002664..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: DEPLOYMENT - value: KUBEFLOW - - name: ARTIFACTS_SERVICE_PROXY_NAME - value: ml-pipeline-ui-artifact - - name: ARTIFACTS_SERVICE_PROXY_PORT - value: "80" - - name: ARTIFACTS_SERVICE_PROXY_ENABLED - value: "true" - - name: ENABLE_AUTHZ - value: "true" - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index 995881231a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - value: "" - valueFrom: null - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index b83ace1849..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,116 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: KUBEFLOW_USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: KUBEFLOW_USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - envFrom: - - configMapRef: - name: pipeline-api-server-config-f4t72426kt - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mpi-operator.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mpi-operator.yaml deleted file mode 100644 index 0c1efb4e29..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mpi-operator.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - spec: - containers: - - args: - - -alsologtostderr - - --lock-namespace - - kubeflow - - --kubectl-delivery-image - - mpioperator/kubectl-delivery:latest - image: mpioperator/mpi-operator:latest - imagePullPolicy: Always - name: mpi-operator - serviceAccountName: mpi-operator diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mxnet-operator.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mxnet-operator.yaml deleted file mode 100644 index a0724c00d7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mxnet-operator.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - spec: - containers: - - command: - - /opt/kubeflow/mxnet-operator.v1 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: kubeflow/mxnet-operator:v1.0.0-20200625 - imagePullPolicy: Always - name: mxnet-operator - serviceAccountName: mxnet-operator diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index a711b8106b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 1e207f863e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 8069350e8c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml b/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml deleted file mode 100644 index c9e1f4f031..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_admission-webhook-cert.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - name: admission-webhook-cert - namespace: kubeflow -spec: - commonName: admission-webhook-service.kubeflow.svc - dnsNames: - - admission-webhook-service.kubeflow.svc - - admission-webhook-service.kubeflow.svc.cluster.local - isCA: true - issuerRef: - kind: ClusterIssuer - name: kubeflow-self-signing-issuer - secretName: webhook-certs diff --git a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/kubernetes/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/kubernetes/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index f699389ffb..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - childResources: - - apiVersion: v1 - resource: secrets - updateStrategy: - method: OnDelete - - apiVersion: v1 - resource: configmaps - updateStrategy: - method: OnDelete - - apiVersion: apps/v1 - resource: deployments - updateStrategy: - method: InPlace - - apiVersion: v1 - resource: services - updateStrategy: - method: InPlace - - apiVersion: networking.istio.io/v1alpha3 - resource: destinationrules - updateStrategy: - method: InPlace - - apiVersion: security.istio.io/v1beta1 - resource: authorizationpolicies - updateStrategy: - method: InPlace - generateSelector: true - hooks: - sync: - webhook: - url: http://kubeflow-pipelines-profile-controller/sync - parentResource: - apiVersion: v1 - resource: namespaces - resyncPeriodSeconds: 10 diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml deleted file mode 100644 index 09c0a7d17d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-mysql - namespace: kubeflow -spec: - host: mysql.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml deleted file mode 100644 index ad592610e0..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 2e2fd51f44..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - host: ml-pipeline-visualizationserver.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml deleted file mode 100644 index 8cca5fda78..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_destinationrule_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - host: ml-pipeline.kubeflow.svc.cluster.local - trafficPolicy: - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 3ed69a58a6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ae97df8cf3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index 09813d57ad..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,15 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 1a80b46609..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml deleted file mode 100644 index 8afc1cd608..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mpijobs-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml deleted file mode 100644 index 598c7c7b7b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mpijobs-admin: "true" - name: kubeflow-mpijobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml deleted file mode 100644 index b3ef136d77..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mpijobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mpijobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml deleted file mode 100644 index 7292a7b4b9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-mxjobs-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml deleted file mode 100644 index a6778579cd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-mxjobs-admin: "true" - name: kubeflow-mxjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml deleted file mode 100644 index 8abdd41f86..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-mxjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-mxjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - - mxjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index e6bc4ed4ea..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index bffc6fda4a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 180e34e5c4..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index f206ae5fc3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml deleted file mode 100644 index 862294c42e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index c4d627de01..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml deleted file mode 100644 index 9ef4b587b5..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_mpi-operator.yaml +++ /dev/null @@ -1,107 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - verbs: - - create - - list - - watch -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - pods/exec - verbs: - - create -- apiGroups: - - "" - resources: - - endpoints - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - create - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - list - - update - - watch -- apiGroups: - - apps - resources: - - statefulsets - verbs: - - create - - list - - update - - watch -- apiGroups: - - batch - resources: - - jobs - verbs: - - create - - list - - update - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - kubeflow.org - resources: - - mpijobs - - mpijobs/finalizers - - mpijobs/status - verbs: - - '*' -- apiGroups: - - scheduling.incubator.k8s.io - - scheduling.sigs.dev - resources: - - queues - - podgroups - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 48bed8ccb7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index a13cabbb82..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index e7ee7127e6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index 96febc69e1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index f3f1b2dc2e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 7a864a75dd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index c815c7bcdf..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml deleted file mode 100644 index 5ceb1390e6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_mpi-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mpi-operator -subjects: -- kind: ServiceAccount - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml deleted file mode 100644 index a18fd8fbb3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml deleted file mode 100644 index 0008889d3b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_mxnet-operator.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - mxjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - - pods - - services - - endpoints - - persistentvolumeclaims - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml deleted file mode 100644 index 4d0d9ff2dd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml deleted file mode 100644 index 09c59a95a9..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_mxnet-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: mxnet-operator -subjects: -- kind: ServiceAccount - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml b/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml deleted file mode 100644 index d45ff790c8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-internal.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-internal - namespace: kubeflow -spec: - rules: - - from: - - source: - principals: - - cluster.local/ns/kubeflow/sa/ml-pipeline - - cluster.local/ns/kubeflow/sa/ml-pipeline-ui - - cluster.local/ns/kubeflow/sa/ml-pipeline-persistenceagent - - cluster.local/ns/kubeflow/sa/ml-pipeline-scheduledworkflow - - cluster.local/ns/kubeflow/sa/ml-pipeline-viewer-crd-service-account - - cluster.local/ns/kubeflow/sa/kubeflow-pipelines-cache - to: - - operation: {} - selector: - matchExpressions: - - key: app - operator: In - values: - - ml-pipeline - - ml-pipeline-ui - - ml-pipeline-visualizationserver - - mysql diff --git a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml deleted file mode 100644 index f699859400..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - rules: - - from: - - source: - namespaces: - - istio-system - to: - - operation: {} - selector: - matchLabels: - app: ml-pipeline-ui diff --git a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml b/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml deleted file mode 100644 index 25e54df90d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/security.istio.io_v1beta1_authorizationpolicy_service-cache-server.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: security.istio.io/v1beta1 -kind: AuthorizationPolicy -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: service-cache-server - namespace: kubeflow -spec: - rules: - - to: - - operation: {} - selector: - matchLabels: - app: cache-server diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index 1dd6173c08..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - issuer: kubeflow-self-signing-issuer - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml deleted file mode 100644 index 43cdcb8de3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-8kcgd8t8th.yaml +++ /dev/null @@ -1,196 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-8kcgd8t8th - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-config.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-config.yaml deleted file mode 100644 index 1deb5ff28a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-config.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - cluster-name: "" - clusterDomain: cluster.local - istio-namespace: istio-system - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml deleted file mode 100644 index 9947484f33..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-code-7g6bb7c22k.yaml +++ /dev/null @@ -1,280 +0,0 @@ -apiVersion: v1 -data: - sync.py: | - # Copyright 2020 Google LLC - # - # Licensed under the Apache License, Version 2.0 (the "License"); - # you may not use this file except in compliance with the License. - # You may obtain a copy of the License at - # - # http://www.apache.org/licenses/LICENSE-2.0 - # - # Unless required by applicable law or agreed to in writing, software - # distributed under the License is distributed on an "AS IS" BASIS, - # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - # See the License for the specific language governing permissions and - # limitations under the License. - - from http.server import BaseHTTPRequestHandler, HTTPServer - import json - import os - import base64 - - kfp_version = os.environ["KFP_VERSION"] - disable_istio_sidecar = os.environ.get("DISABLE_ISTIO_SIDECAR") == "true" - mlpipeline_minio_access_key = base64.b64encode( - bytes(os.environ.get("MINIO_ACCESS_KEY"), 'utf-8')).decode('utf-8') - mlpipeline_minio_secret_key = base64.b64encode( - bytes(os.environ.get("MINIO_SECRET_KEY"), 'utf-8')).decode('utf-8') - - - class Controller(BaseHTTPRequestHandler): - def sync(self, parent, children): - # HACK: Currently using serving.kubeflow.org/inferenceservice to identify - # kubeflow user namespaces. - # TODO: let Kubeflow profile controller add a pipeline specific label to - # user namespaces and use that label instead. - pipeline_enabled = parent.get("metadata", {}).get( - "labels", {}).get("serving.kubeflow.org/inferenceservice") - - if not pipeline_enabled: - return {"status": {}, "children": []} - - # Compute status based on observed state. - desired_status = { - "kubeflow-pipelines-ready": \ - len(children["Secret.v1"]) == 1 and \ - len(children["ConfigMap.v1"]) == 1 and \ - len(children["Deployment.apps/v1"]) == 2 and \ - len(children["Service.v1"]) == 2 and \ - len(children["DestinationRule.networking.istio.io/v1alpha3"]) == 1 and \ - len(children["AuthorizationPolicy.security.istio.io/v1beta1"]) == 1 and \ - "True" or "False" - } - - # Generate the desired child object(s). - # parent is a namespace - namespace = parent.get("metadata", {}).get("name") - desired_resources = [ - { - "apiVersion": "v1", - "kind": "ConfigMap", - "metadata": { - "name": "metadata-grpc-configmap", - "namespace": namespace, - }, - "data": { - "METADATA_GRPC_SERVICE_HOST": - "metadata-grpc-service.kubeflow", - "METADATA_GRPC_SERVICE_PORT": "8080", - }, - }, - # Visualization server related manifests below - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - }, - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-visualizationserver" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "image": - "gcr.io/ml-pipeline/visualization-server:" + - kfp_version, - "imagePullPolicy": - "IfNotPresent", - "name": - "ml-pipeline-visualizationserver", - "ports": [{ - "containerPort": 8888 - }], - }], - "serviceAccountName": - "default-editor", - }, - }, - }, - }, - { - "apiVersion": "networking.istio.io/v1alpha3", - "kind": "DestinationRule", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "host": "ml-pipeline-visualizationserver", - "trafficPolicy": { - "tls": { - "mode": "ISTIO_MUTUAL" - } - } - } - }, - { - "apiVersion": "security.istio.io/v1beta1", - "kind": "AuthorizationPolicy", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-visualizationserver" - } - }, - "rules": [{ - "from": [{ - "source": { - "principals": ["cluster.local/ns/kubeflow/sa/ml-pipeline"] - } - }] - }] - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-visualizationserver", - "namespace": namespace, - }, - "spec": { - "ports": [{ - "name": "http", - "port": 8888, - "protocol": "TCP", - "targetPort": 8888, - }], - "selector": { - "app": "ml-pipeline-visualizationserver", - }, - }, - }, - # Artifact fetcher related resources below. - { - "apiVersion": "apps/v1", - "kind": "Deployment", - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - }, - "spec": { - "selector": { - "matchLabels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "template": { - "metadata": { - "labels": { - "app": "ml-pipeline-ui-artifact" - }, - "annotations": disable_istio_sidecar and { - "sidecar.istio.io/inject": "false" - } or {}, - }, - "spec": { - "containers": [{ - "name": - "ml-pipeline-ui-artifact", - "image": - "gcr.io/ml-pipeline/frontend:" + kfp_version, - "imagePullPolicy": - "IfNotPresent", - "ports": [{ - "containerPort": 3000 - }] - }], - "serviceAccountName": - "default-editor" - } - } - } - }, - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "ml-pipeline-ui-artifact", - "namespace": namespace, - "labels": { - "app": "ml-pipeline-ui-artifact" - } - }, - "spec": { - "ports": [{ - "name": - "http", # name is required to let istio understand request protocol - "port": 80, - "protocol": "TCP", - "targetPort": 3000 - }], - "selector": { - "app": "ml-pipeline-ui-artifact" - } - } - }, - ] - print('Received request:', parent) - print('Desired resources except secrets:', desired_resources) - # Moved after the print argument because this is sensitive data. - desired_resources.append({ - "apiVersion": "v1", - "kind": "Secret", - "metadata": { - "name": "mlpipeline-minio-artifact", - "namespace": namespace, - }, - "data": { - "accesskey": mlpipeline_minio_access_key, - "secretkey": mlpipeline_minio_secret_key, - }, - }) - - return {"status": desired_status, "children": desired_resources} - - def do_POST(self): - # Serve the sync() function as a JSON webhook. - observed = json.loads( - self.rfile.read(int(self.headers.get("content-length")))) - desired = self.sync(observed["parent"], observed["children"]) - - self.send_response(200) - self.send_header("Content-type", "application/json") - self.end_headers() - self.wfile.write(bytes(json.dumps(desired), 'utf-8')) - - - HTTPServer(("", 80), Controller).serve_forever() -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-code-7g6bb7c22k - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml deleted file mode 100644 index 80bb7ba538..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_kubeflow-pipelines-profile-controller-env-mgh6th2gff.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - DISABLE_ISTIO_SIDECAR: "false" -kind: ConfigMap -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller-env-mgh6th2gff - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index da561543e7..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "default-editor" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml deleted file mode 100644 index ff54ae481a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_mpi-operator-config.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - kubectl-delivery-image: mpioperator/kubectl-delivery:latest - lock-namespace: kubeflow -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml deleted file mode 100644 index 90de9ec34a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-api-server-config-f4t72426kt.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - DEFAULTPIPELINERUNNERSERVICEACCOUNT: default-editor - MULTIUSER: "true" - VISUALIZATIONSERVICE_NAME: ml-pipeline-visualizationserver - VISUALIZATIONSERVICE_PORT: "8888" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-api-server-config-f4t72426kt - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9d9b1dcd68..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 0f695c21ce..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 8394d22cf8..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index 1636dc9520..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml deleted file mode 100644 index a22de6bef3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_kubeflow-pipelines-profile-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-profile-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 80 - selector: - app: kubeflow-pipelines-profile-controller - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 8625b1f0ae..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 6f41ce954d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: poddefaults - app.kubernetes.io/name: poddefaults - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml deleted file mode 100644 index dbe19ff814..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mpi-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mpi-operator - app.kubernetes.io/component: mpijob - app.kubernetes.io/name: mpi-operator - kustomize.component: mpi-operator - name: mpi-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml deleted file mode 100644 index 668c2e0f1d..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_mxnet-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mxnet-operator - app.kubernetes.io/component: mxnet - app.kubernetes.io/name: mxnet-operator - kustomize.component: mxnet-operator - name: mxnet-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/kubernetes/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/kustomize_test.go b/tests/stacks/openshift/application/argo/kustomize_test.go deleted file mode 100644 index e8a70ccc2f..0000000000 --- a/tests/stacks/openshift/application/argo/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package argo - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/argo", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/stacks/openshift/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 08f6d1185c..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/stacks/openshift/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 4c20d279dd..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index 94c841f165..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index a7fdf681eb..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/stacks/openshift/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index a5ab61a1c2..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index c9e39f4614..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 7651a6568e..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index f1df09722c..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index 266bc01c4e..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 9797e191de..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: k8sapi, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index f165258d39..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: k8sapi - executorImage: argoproj/argoexec:v2.3.0 - namespace: "" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 0e091e0898..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index c58dd0a3d4..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index ad307ff2ca..0000000000 --- a/tests/stacks/openshift/application/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/stacks/openshift/application/cert-manager-crds/kustomize_test.go b/tests/stacks/openshift/application/cert-manager-crds/kustomize_test.go deleted file mode 100644 index 74eaa84caa..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/stacks/openshift/application/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/kustomize_test.go b/tests/stacks/openshift/application/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index df06a7fe6f..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index d8e47f2a94..0000000000 --- a/tests/stacks/openshift/application/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/stacks/openshift/application/cert-manager/kustomize_test.go b/tests/stacks/openshift/application/cert-manager/kustomize_test.go deleted file mode 100644 index 829756a53a..0000000000 --- a/tests/stacks/openshift/application/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 93e06c4304..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index 36a2524012..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 21cdee5406..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 09a9cfab99..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index 6ae84bc8c0..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 33ab9729d5..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index 8a116d7b30..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 2a25e06d49..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 6ce5b8e0cc..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index f62a08529b..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index b0d464bfd5..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index ce897a6a3b..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index ad80b32de5..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index fb0a1201cf..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bea275aa9c..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index a276b13742..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index 13b98eeaae..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index d5f2de3e1b..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index bd1d73f13b..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 80792a8f24..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 7ee5331ba6..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index bbc5ee440a..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 6a79270953..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index 854ffd11fe..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index 137f15e731..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index b19073be57..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index f40a39080a..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index d0a3fd2d22..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index adb10f9073..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index b25a401652..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index e71b15aaa6..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index 11c24d45c8..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index 882e257d96..0000000000 --- a/tests/stacks/openshift/application/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/name: cert-manager - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/kustomize_test.go b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/kustomize_test.go deleted file mode 100644 index 4622523130..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cluster_local_gateway_1_3_1 - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/cluster-local-gateway-1-3-1", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml deleted file mode 100644 index 8192241e3a..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/apps_v1_deployment_cluster-local-gateway.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - strategy: - rollingUpdate: - maxSurge: null - maxUnavailable: null - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - cluster-local-gateway - - --zipkinAddress - - zipkin.istio-system:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot.istio-system:15010 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "false" - - name: ISTIO_META_WORKLOAD_NAME - value: cluster-local-gateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/cluster-local-gateway - image: docker.io/istio/proxyv2:1.3.1 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15011 - - containerPort: 8060 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-certs - name: clusterlocalgateway-certs - readOnly: true - - mountPath: /etc/istio/clusterlocalgateway-ca-certs - name: clusterlocalgateway-ca-certs - readOnly: true - serviceAccountName: cluster-local-gateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.cluster-local-gateway-service-account - - name: clusterlocalgateway-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-certs - - name: clusterlocalgateway-ca-certs - secret: - optional: true - secretName: istio-clusterlocalgateway-ca-certs diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml deleted file mode 100644 index 3356f9214a..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: cluster-local-gateway diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml deleted file mode 100644 index c53a86f32f..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/policy_v1beta1_poddisruptionbudget_cluster-local-gateway.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index f2ee7370cd..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 5b01c913b8..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml deleted file mode 100644 index d65b3c311d..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_configmap_cluster-local-gateway-config.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - labels: - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-config - namespace: istio-system diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 07a4ad5c36..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-system diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml deleted file mode 100644 index 4e77224980..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_service_cluster-local-gateway.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - targetPort: 80 - - name: https - port: 443 - - name: tcp - port: 31400 - - name: tcp-pilot-grpc-tls - port: 15011 - targetPort: 15011 - - name: tcp-citadel-grpc-tls - port: 8060 - targetPort: 8060 - - name: http2-kiali - port: 15029 - targetPort: 15029 - - name: http2-prometheus - port: 15030 - targetPort: 15030 - - name: http2-grafana - port: 15031 - targetPort: 15031 - - name: http2-tracing - port: 15032 - targetPort: 15032 - selector: - app: cluster-local-gateway - istio: cluster-local-gateway - kustomize.component: cluster-local-gateway - type: ClusterIP diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml deleted file mode 100644 index f8940db4bf..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_cluster-local-gateway-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cluster-local-gateway - kustomize.component: cluster-local-gateway - name: cluster-local-gateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 337ef9a37e..0000000000 --- a/tests/stacks/openshift/application/cluster-local-gateway-1-3-1/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: cluster-local-gateway - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/kustomize_test.go b/tests/stacks/openshift/application/istio-1-3-1-stack/kustomize_test.go deleted file mode 100644 index 8dd32a390a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_1_3_1_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/istio-1-3-1-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index d7aa03f87d..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 7edbd19816..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-adapter - kustomize.component: istio-crds - package: adapter - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index 7864def1ea..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml deleted file mode 100644 index 1180849525..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizationpolicies.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: authorizationpolicies.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: AuthorizationPolicy - plural: authorizationpolicies - singular: authorizationpolicy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 2a4631cf5e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 138b667371..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index f0e7d55b9d..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 6a7257c6db..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - istio: rbac - kustomize.component: istio-crds - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 00470c08e2..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index d3560e8cbb..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index 787adcd33c..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index d08bd06c40..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-handler - kustomize.component: istio-crds - package: handler - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 5efdd1c1bd..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index f3c47edcf6..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 106fb5f240..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-instance - kustomize.component: istio-crds - package: instance - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index 18ab2ea4c9..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 8acfb192f2..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 796c9fa8e6..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: certmanager - kustomize.component: istio-crds - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index 7f6d447e54..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-citadel - kustomize.component: istio-crds - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index cf34ff9565..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 782ac3f591..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-mixer - kustomize.component: istio-crds - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 420974db07..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index e57f11c367..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: core - kustomize.component: istio-crds - package: istio.io.mixer - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index e52b86065a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index bb19b9a158..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index f8b6e02a93..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: rbac - kustomize.component: istio-crds - package: istio.io.mixer - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index dcb1f2185e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 57df1e0445..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: mixer - istio: mixer-template - kustomize.component: istio-crds - package: template - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index 26e9eb1a10..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: istio-pilot - kustomize.component: istio-crds - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - versions: - - name: v1alpha3 - served: true - storage: true diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml deleted file mode 100644 index ac07dec74a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_daemonset_istio-nodeagent.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app: nodeagent - istio: nodeagent - name: istio-nodeagent - namespace: istio-system -spec: - selector: - matchLabels: - istio: nodeagent - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: nodeagent - istio: nodeagent - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: CA_ADDR - value: istio-citadel:8060 - - name: CA_PROVIDER - value: Citadel - - name: PLUGINS - value: "" - - name: VALID_TOKEN - value: "true" - - name: TRUST_DOMAIN - value: "" - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/istio-release/node-agent-k8s:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: nodeagent - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - serviceAccountName: istio-nodeagent-service-account - tolerations: - - effect: NoExecute - operator: Exists - - effect: NoSchedule - operator: Exists - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - updateStrategy: - type: RollingUpdate diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 71d2e3470e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: citadel - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - istio: citadel - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --sds-enabled=true - - --append-dns-names=true - - --grpc-port=8060 - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - - --workload-cert-ttl=2160h - env: - - name: CITADEL_ENABLE_NAMESPACES_BY_DEFAULT - value: "true" - image: gcr.io/istio-release/citadel:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 5b344bf192..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: galley - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - istio: galley - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=false - - --validation-webhook-config-file - - /etc/config/validating-webhook-configuration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - image: gcr.io/istio-release/galley:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 61171d41be..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - istio: ingressgateway - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - MUTUAL_TLS - - --discoveryAddress - - istio-pilot:15011 - env: - - name: NODE_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: spec.nodeName - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: "true" - - name: ISTIO_META_WORKLOAD_NAME - value: istio-ingressgateway - - name: ISTIO_META_OWNER - value: kubernetes://api/apps/v1/namespaces/istio-system/deployments/istio-ingressgateway - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /var/run/sds - name: sdsudspath - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sdsudspath - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 2287dd6a98..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - istio: pilot - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "1" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_OUTBOUND - value: "true" - - name: PILOT_ENABLE_PROTOCOL_SNIFFING_FOR_INBOUND - value: "false" - image: gcr.io/istio-release/pilot:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - requests: - cpu: 500m - memory: 2048Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - serviceAccountName: istio-pilot-service-account - volumes: - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 27069e1098..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - istio: mixer - istio-mixer-type: policy - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --useTemplateCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index c2ef009a0f..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,117 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - istio: sidecar-injector - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: gcr.io/istio-release/sidecar_injector:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - - key: values - path: values - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index dc32c6d0e8..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,185 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 100% - maxUnavailable: 25% - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcps://istio-galley.istio-system.svc:9901 - - --certFile=/etc/certs/cert-chain.pem - - --keyFile=/etc/certs/key.pem - - --caCertFile=/etc/certs/root-cert.pem - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=false - - --trace_zipkin_url=http://zipkin.istio-system:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: gcr.io/istio-release/mixer:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 4800m - memory: 4G - requests: - cpu: 1000m - memory: 1G - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - MUTUAL_TLS - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: SDS_ENABLED - value: "true" - image: gcr.io/istio-release/proxyv2:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 1024Mi - requests: - cpu: 100m - memory: 128Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - hostPath: - path: /var/run/sds - name: sds-uds-path - - name: istio-token - projected: - sources: - - serviceAccountToken: - audience: istio-ca - expirationSeconds: 43200 - path: istio-token - - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index bd61a789cb..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,87 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yaml - image: docker.io/prom/prometheus:v2.8.0 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index b11d522036..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 5c0aeb158b..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index 96d1bb443e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index f8de3ad33a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml deleted file mode 100644 index bc3e9b5c7e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/batch_v1_job_istio-security-post-install-release-1.3-latest-daily.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - labels: - app: security - name: istio-security-post-install-release-1.3-latest-daily - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/istio-security-run.sh - - /tmp/security/istio-security-custom-resources.yaml - image: gcr.io/istio-release/kubectl:release-1.3-latest-daily - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index 194c9f3e74..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.proxy_version: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 2b48f38df5..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 6eb5203232..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 591f65ede8..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,213 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.instance.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.instance.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml deleted file mode 100644 index def828bfeb..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_attributes.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: attributes - namespace: istio-system -spec: - attributeBindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - compiledTemplate: kubernetes - params: - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml deleted file mode 100644 index d36350d7ce..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestcount - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml deleted file mode 100644 index e8e7f5cae8..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestduration - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml deleted file mode 100644 index 92a052306a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: requestsize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml deleted file mode 100644 index 8fa51f640f..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: responsesize - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | request.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml deleted file mode 100644 index 17059fe110..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytereceived - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml deleted file mode 100644 index 2916bd6d5c..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpbytesent - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml deleted file mode 100644 index a11ed65696..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsclosed - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml deleted file mode 100644 index a54cf0fefc..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_instance_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: instance -metadata: - labels: - app: mixer - name: tcpconnectionsopened - namespace: istio-system -spec: - compiledTemplate: metric - params: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") - == "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", - "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 4f64a20efa..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 1bf9b97a14..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount - - requestduration - - requestsize - - responsesize - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) && (match((request.useragent | "-"), "Prometheus*") - == false) diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index ba53469288..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent - - tcpbytereceived - match: context.protocol == "tcp" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 88b56a9f61..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index d6a57b5eb4..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 359f4d4d82..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes - match: context.protocol == "tcp" diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 6bb534ca87..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index dcc865c1ce..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 - portLevelSettings: - - port: - number: 15004 - tls: - mode: ISTIO_MUTUAL diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 504e447036..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 8ab724961f..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 48ef2e374c..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ab4d9b137..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - istio: mixer - istio-mixer-type: policy - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml deleted file mode 100644 index 6b92933e30..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-sidecar-injector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - istio: sidecar-injector diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index af62a9392d..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index b2b648f7bf..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - - namespaces - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index b07c27bde8..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index e891d1f64e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 712d854b96..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fba93e72ed..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index e058905249..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 7dcde2e12d..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index f3d3217415..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 356d3081d9..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 0c41554f71..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index 3cf724b359..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml deleted file mode 100644 index 416d69e15c..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-nodeagent-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: nodeagent - name: istio-nodeagent-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-nodeagent-istio-system -subjects: -- kind: ServiceAccount - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index eb97384bfa..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index 53b0c9ba50..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index ee14afcdaa..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 0d6ca7e082..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 7516510d7e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml deleted file mode 100644 index ccd2b2092a..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-ingressgateway.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - rules: - - services: - - istio-ingressgateway.istio-system.svc.cluster.local diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml deleted file mode 100644 index 91340ebbb5..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-ingressgateway.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - name: istio-ingressgateway - namespace: istio-system -spec: - roleRef: - kind: ServiceRole - name: istio-ingressgateway - subjects: - - user: '*' diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml deleted file mode 100644 index 9f021fb1e7..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: route.openshift.io/v1 -kind: Route -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - port: - targetPort: http2 - to: - kind: Service - name: istio-ingressgateway - weight: 100 - wildcardPolicy: None diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index 81512e2b6c..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,120 +0,0 @@ -apiVersion: v1 -data: - validating-webhook-configuration.yaml: | - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - labels: - app: galley - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - sideEffects: None - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - - adapters - - handlers - - instances - - templates - - zipkins - failurePolicy: Fail - sideEffects: None -kind: ConfigMap -metadata: - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml deleted file mode 100644 index 693f99563e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-install-config.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -data: - namespace: istio-system -kind: ConfigMap -metadata: - name: istio-install-config - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 3e86dfa9f0..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: v1 -data: - istio-security-custom-resources.yaml: | - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - spec: - peers: - - mtls: - mode: PERMISSIVE - istio-security-run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index af6866c735..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,405 +0,0 @@ -apiVersion: v1 -data: - config: |- - policy: enabled - alwaysInjectSelector: - [] - neverInjectSelector: - [] - template: |- - rewriteAppHTTPProbe: {{ valueOrDefault .Values.sidecarInjectorWebhook.rewriteAppHTTPProbe false }} - {{- if or (not .Values.istio_cni.enabled) .Values.global.proxy.enableCoreDump }} - initContainers: - {{ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `NONE` }} - {{- if not .Values.istio_cni.enabled }} - - name: istio-init - {{- if contains "/" .Values.global.proxy_init.image }} - image: "{{ .Values.global.proxy_init.image }}" - {{- else }} - image: "{{ .Values.global.hub }}/{{ .Values.global.proxy_init.image }}:{{ .Values.global.tag }}" - {{- end }} - args: - - "-p" - - "15001" - - "-z" - - "15006" - - "-u" - - 1337 - - "-m" - - "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - - "-i" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - - "-x" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - - "-b" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` `*` }}" - - "-d" - - "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") -}} - - "-o" - - "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{ end -}} - {{ if (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -}} - - "-k" - - "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - {{ end -}} - imagePullPolicy: "{{ .Values.global.imagePullPolicy }}" - {{- if .Values.global.proxy.init.resources }} - resources: - {{ toYaml .Values.global.proxy.init.resources | indent 4 }} - {{- else }} - resources: {} - {{- end }} - securityContext: - runAsUser: 0 - runAsNonRoot: false - capabilities: - add: - - NET_ADMIN - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - restartPolicy: Always - {{- end }} - {{ end -}} - {{- if eq .Values.global.proxy.enableCoreDump true }} - - name: enable-core-dump - args: - - -c - - sysctl -w kernel.core_pattern=/var/lib/istio/core.proxy && ulimit -c unlimited - command: - - /bin/sh - image: {{ $.Values.global.proxy.enableCoreDumpImage }} - imagePullPolicy: IfNotPresent - resources: {} - securityContext: - runAsUser: 0 - runAsNonRoot: false - privileged: true - {{ end }} - {{- end }} - containers: - - name: istio-proxy - {{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}" - {{- else }} - image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.hub }}/{{ .Values.global.proxy.image }}:{{ .Values.global.tag }}" - {{- end }} - ports: - - containerPort: 15090 - protocol: TCP - name: http-envoy-prom - args: - - proxy - - sidecar - - --domain - - $(POD_NAMESPACE).svc.{{ .Values.global.proxy.clusterDomain }} - - --configPath - - "{{ .ProxyConfig.ConfigPath }}" - - --binaryPath - - "{{ .ProxyConfig.BinaryPath }}" - - --serviceCluster - {{ if ne "" (index .ObjectMeta.Labels "app") -}} - - "{{ index .ObjectMeta.Labels `app` }}.$(POD_NAMESPACE)" - {{ else -}} - - "{{ valueOrDefault .DeploymentMeta.Name `istio-proxy` }}.{{ valueOrDefault .DeploymentMeta.Namespace `default` }}" - {{ end -}} - - --drainDuration - - "{{ formatDuration .ProxyConfig.DrainDuration }}" - - --parentShutdownDuration - - "{{ formatDuration .ProxyConfig.ParentShutdownDuration }}" - - --discoveryAddress - - "{{ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress }}" - {{- if eq .Values.global.proxy.tracer "lightstep" }} - - --lightstepAddress - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAddress }}" - - --lightstepAccessToken - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetAccessToken }}" - - --lightstepSecure={{ .ProxyConfig.GetTracing.GetLightstep.GetSecure }} - - --lightstepCacertPath - - "{{ .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }}" - {{- else if eq .Values.global.proxy.tracer "zipkin" }} - - --zipkinAddress - - "{{ .ProxyConfig.GetTracing.GetZipkin.GetAddress }}" - {{- else if eq .Values.global.proxy.tracer "datadog" }} - - --datadogAgentAddress - - "{{ .ProxyConfig.GetTracing.GetDatadog.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.logLevel }} - - --proxyLogLevel={{ .Values.global.proxy.logLevel }} - {{- end}} - {{- if .Values.global.proxy.componentLogLevel }} - - --proxyComponentLogLevel={{ .Values.global.proxy.componentLogLevel }} - {{- end}} - - --dnsRefreshRate - - {{ .Values.global.proxy.dnsRefreshRate }} - - --connectTimeout - - "{{ formatDuration .ProxyConfig.ConnectTimeout }}" - {{- if .Values.global.proxy.envoyStatsd.enabled }} - - --statsdUdpAddress - - "{{ .ProxyConfig.StatsdUdpAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyMetricsService.enabled }} - - --envoyMetricsServiceAddress - - "{{ .ProxyConfig.GetEnvoyMetricsService.GetAddress }}" - {{- end }} - {{- if .Values.global.proxy.envoyAccessLogService.enabled }} - - --envoyAccessLogService - - '{{ structToJSON .ProxyConfig.EnvoyAccessLogService }}' - {{- end }} - - --proxyAdminPort - - "{{ .ProxyConfig.ProxyAdminPort }}" - {{ if gt .ProxyConfig.Concurrency 0 -}} - - --concurrency - - "{{ .ProxyConfig.Concurrency }}" - {{ end -}} - - --controlPlaneAuthPolicy - - "{{ annotation .ObjectMeta `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy }}" - {{- if (ne (annotation .ObjectMeta "status.sidecar.istio.io/port" .Values.global.proxy.statusPort) "0") }} - - --statusPort - - "{{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }}" - - --applicationPorts - - "{{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` (applicationPorts .Spec.Containers) }}" - {{- end }} - {{- if .Values.global.trustDomain }} - - --trust-domain={{ .Values.global.trustDomain }} - {{- end }} - env: - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_POD_PORTS - value: |- - [ - {{- range $index1, $c := .Spec.Containers }} - {{- range $index2, $p := $c.Ports }} - {{if or (ne $index1 0) (ne $index2 0)}},{{end}}{{ structToJSON $p }} - {{- end}} - {{- end}} - ] - - name: ISTIO_META_CLUSTER_ID - value: "{{ valueOrDefault .Values.global.multicluster.clusterName `Kubernetes` }}" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SERVICE_ACCOUNT - valueFrom: - fieldRef: - fieldPath: spec.serviceAccountName - {{- if eq .Values.global.proxy.tracer "datadog" }} - - name: HOST_IP - valueFrom: - fieldRef: - fieldPath: status.hostIP - {{- if isset .ObjectMeta.Annotations `apm.datadoghq.com/env` }} - {{- range $key, $value := fromJSON (index .ObjectMeta.Annotations `apm.datadoghq.com/env`) }} - - name: {{ $key }} - value: "{{ $value }}" - {{- end }} - {{- end }} - {{- end }} - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SDS_ENABLED - value: {{ $.Values.global.sds.enabled }} - - name: ISTIO_META_INTERCEPTION_MODE - value: "{{ or (index .ObjectMeta.Annotations `sidecar.istio.io/interceptionMode`) .ProxyConfig.InterceptionMode.String }}" - - name: ISTIO_META_INCLUDE_INBOUND_PORTS - value: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (applicationPorts .Spec.Containers) }}" - {{- if .Values.global.network }} - - name: ISTIO_META_NETWORK - value: "{{ .Values.global.network }}" - {{- end }} - {{ if .ObjectMeta.Annotations }} - - name: ISTIO_METAJSON_ANNOTATIONS - value: | - {{ toJSON .ObjectMeta.Annotations }} - {{ end }} - {{ if .ObjectMeta.Labels }} - - name: ISTIO_METAJSON_LABELS - value: | - {{ toJSON .ObjectMeta.Labels }} - {{ end }} - {{- if .DeploymentMeta.Name }} - - name: ISTIO_META_WORKLOAD_NAME - value: {{ .DeploymentMeta.Name }} - {{ end }} - {{- if and .TypeMeta.APIVersion .DeploymentMeta.Name }} - - name: ISTIO_META_OWNER - value: kubernetes://api/{{ .TypeMeta.APIVersion }}/namespaces/{{ valueOrDefault .DeploymentMeta.Namespace `default` }}/{{ toLower .TypeMeta.Kind}}s/{{ .DeploymentMeta.Name }} - {{- end}} - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: ISTIO_BOOTSTRAP_OVERRIDE - value: "/etc/istio/custom-bootstrap/custom_bootstrap.json" - {{- end }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: ISTIO_META_SDS_TOKEN_PATH - value: "{{ .Values.global.sds.customTokenDirectory -}}/sdstoken" - {{- end }} - {{- if .Values.global.meshID }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.meshID }}" - {{- else if .Values.global.trustDomain }} - - name: ISTIO_META_MESH_ID - value: "{{ .Values.global.trustDomain }}" - {{- end }} - imagePullPolicy: {{ .Values.global.imagePullPolicy }} - {{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }} - readinessProbe: - httpGet: - path: /healthz/ready - port: {{ annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort }} - initialDelaySeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` .Values.global.proxy.readinessInitialDelaySeconds }} - periodSeconds: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` .Values.global.proxy.readinessPeriodSeconds }} - failureThreshold: {{ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` .Values.global.proxy.readinessFailureThreshold }} - {{ end -}} - securityContext: - {{- if .Values.global.proxy.privileged }} - privileged: true - {{- end }} - {{- if ne .Values.global.proxy.enableCoreDump true }} - readOnlyRootFilesystem: true - {{- end }} - {{ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY` -}} - capabilities: - add: - - NET_ADMIN - runAsGroup: 1337 - {{ else -}} - {{ if .Values.global.sds.enabled }} - runAsGroup: 1337 - {{- end }} - runAsUser: 1337 - {{- end }} - resources: - {{ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - requests: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -}} - cpu: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` }}" - {{ end}} - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -}} - memory: "{{ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` }}" - {{ end }} - {{ else -}} - {{- if .Values.global.proxy.resources }} - {{ toYaml .Values.global.proxy.resources | indent 4 }} - {{- end }} - {{ end -}} - volumeMounts: - {{ if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - mountPath: /etc/istio/custom-bootstrap - name: custom-bootstrap-volume - {{- end }} - - mountPath: /etc/istio/proxy - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - mountPath: /var/run/sds - name: sds-uds-path - readOnly: true - - mountPath: /var/run/secrets/tokens - name: istio-token - {{- if .Values.global.sds.customTokenDirectory }} - - mountPath: "{{ .Values.global.sds.customTokenDirectory -}}" - name: custom-sds-token - readOnly: true - {{- end }} - {{- else }} - - mountPath: /etc/certs/ - name: istio-certs - readOnly: true - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - mountPath: {{ directory .ProxyConfig.GetTracing.GetLightstep.GetCacertPath }} - name: lightstep-certs - readOnly: true - {{- end }} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` }} - {{ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 4 }} - {{ end }} - {{- end }} - volumes: - {{- if (isset .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) }} - - name: custom-bootstrap-volume - configMap: - name: {{ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` "" }} - {{- end }} - - emptyDir: - medium: Memory - name: istio-envoy - {{- if .Values.global.sds.enabled }} - - name: sds-uds-path - hostPath: - path: /var/run/sds - - name: istio-token - projected: - sources: - - serviceAccountToken: - path: istio-token - expirationSeconds: 43200 - audience: {{ .Values.global.sds.token.aud }} - {{- if .Values.global.sds.customTokenDirectory }} - - name: custom-sds-token - secret: - secretName: sdstokensecret - {{- end }} - {{- else }} - - name: istio-certs - secret: - optional: true - {{ if eq .Spec.ServiceAccountName "" }} - secretName: istio.default - {{ else -}} - secretName: {{ printf "istio.%s" .Spec.ServiceAccountName }} - {{ end -}} - {{- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` }} - {{range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) }} - - name: "{{ $index }}" - {{ toYaml $value | indent 2 }} - {{ end }} - {{ end }} - {{- end }} - {{- if and (eq .Values.global.proxy.tracer "lightstep") .Values.global.tracer.lightstep.cacertPath }} - - name: lightstep-certs - secret: - optional: true - secretName: lightstep.cacert - {{- end }} - {{- if .Values.global.podDNSSearchNamespaces }} - dnsConfig: - searches: - {{- range .Values.global.podDNSSearchNamespaces }} - - {{ render . }} - {{- end }} - {{- end }} - podRedirectAnnot: - sidecar.istio.io/interceptionMode: "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}" - traffic.sidecar.istio.io/includeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeOutboundIPRanges` .Values.global.proxy.includeIPRanges }}" - traffic.sidecar.istio.io/excludeOutboundIPRanges: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` .Values.global.proxy.excludeIPRanges }}" - traffic.sidecar.istio.io/includeInboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` (includeInboundPorts .Spec.Containers) }}" - traffic.sidecar.istio.io/excludeInboundPorts: "{{ excludeInboundPort (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) (annotation .ObjectMeta `traffic.sidecar.istio.io/excludeInboundPorts` .Values.global.proxy.excludeInboundPorts) }}" - {{ if or (isset .ObjectMeta.Annotations `traffic.sidecar.istio.io/excludeOutboundPorts`) (ne .Values.global.proxy.excludeOutboundPorts "") }} - traffic.sidecar.istio.io/excludeOutboundPorts: "{{ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundPorts` .Values.global.proxy.excludeOutboundPorts }}" - {{- end }} - traffic.sidecar.istio.io/kubevirtInterfaces: "{{ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` }}" - values: '{"certmanager":{"enabled":false},"galley":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"galley","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"gateways":{"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"istio-egressgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"labels":{"app":"istio-egressgateway","istio":"egressgateway"},"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"http2","port":80},{"name":"https","port":443},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/egressgateway-certs","name":"egressgateway-certs","secretName":"istio-egressgateway-certs"},{"mountPath":"/etc/istio/egressgateway-ca-certs","name":"egressgateway-ca-certs","secretName":"istio-egressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"ClusterIP"},"istio-ilbgateway":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":false,"labels":{"app":"istio-ilbgateway","istio":"ilbgateway"},"loadBalancerIP":"","nodeSelector":{},"podAnnotations":{},"ports":[{"name":"grpc-pilot-mtls","port":15011},{"name":"grpc-pilot","port":15010},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns","port":5353}],"resources":{"requests":{"cpu":"800m","memory":"512Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","secretVolumes":[{"mountPath":"/etc/istio/ilbgateway-certs","name":"ilbgateway-certs","secretName":"istio-ilbgateway-certs"},{"mountPath":"/etc/istio/ilbgateway-ca-certs","name":"ilbgateway-ca-certs","secretName":"istio-ilbgateway-ca-certs"}],"serviceAnnotations":{"cloud.google.com/load-balancer-type":"internal"},"tolerations":[],"type":"LoadBalancer"},"istio-ingressgateway":{"applicationPorts":"","autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"env":{"ISTIO_META_ROUTER_MODE":"sni-dnat"},"externalIPs":[],"labels":{"app":"istio-ingressgateway","istio":"ingressgateway"},"loadBalancerIP":"","loadBalancerSourceRanges":[],"meshExpansionPorts":[{"name":"tcp-pilot-grpc-tls","port":15011,"targetPort":15011},{"name":"tcp-mixer-grpc-tls","port":15004,"targetPort":15004},{"name":"tcp-citadel-grpc-tls","port":8060,"targetPort":8060},{"name":"tcp-dns-tls","port":853,"targetPort":853}],"nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"ports":[{"name":"status-port","port":15020,"targetPort":15020},{"name":"http2","nodePort":31380,"port":80,"targetPort":80},{"name":"https","nodePort":31390,"port":443},{"name":"tcp","nodePort":31400,"port":31400},{"name":"https-kiali","port":15029,"targetPort":15029},{"name":"https-prometheus","port":15030,"targetPort":15030},{"name":"https-grafana","port":15031,"targetPort":15031},{"name":"https-tracing","port":15032,"targetPort":15032},{"name":"tls","port":15443,"targetPort":15443}],"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sds":{"enabled":false,"image":"node-agent-k8s","resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}}},"secretVolumes":[{"mountPath":"/etc/istio/ingressgateway-certs","name":"ingressgateway-certs","secretName":"istio-ingressgateway-certs"},{"mountPath":"/etc/istio/ingressgateway-ca-certs","name":"ingressgateway-ca-certs","secretName":"istio-ingressgateway-ca-certs"}],"serviceAnnotations":{},"tolerations":[],"type":"LoadBalancer"}},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"grafana":{"enabled":false},"istio_cni":{"enabled":false},"istiocoredns":{"enabled":false},"kiali":{"enabled":false},"mixer":{"adapters":{"kubernetesenv":{"enabled":true},"prometheus":{"enabled":true,"metricsExpiryDuration":"10m"},"stdio":{"enabled":false,"outputAsJson":true},"useAdapterCRDs":false},"env":{"GODEBUG":"gctrace=1","GOMAXPROCS":"6"},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"mixer","nodeSelector":{},"podAnnotations":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"policy":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%"},"telemetry":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enabled":true,"loadshedding":{"latencyThreshold":"100ms","mode":"enforce"},"replicaCount":1,"reportBatchMaxEntries":100,"reportBatchMaxTime":"1s","resources":{"limits":{"cpu":"4800m","memory":"4G"},"requests":{"cpu":"1000m","memory":"1G"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sessionAffinityEnabled":false},"tolerations":[]},"nodeagent":{"enabled":true,"env":{"CA_ADDR":"istio-citadel:8060","CA_PROVIDER":"Citadel","PLUGINS":"","VALID_TOKEN":true},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"node-agent-k8s","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"tolerations":[]},"pilot":{"autoscaleEnabled":true,"autoscaleMax":5,"autoscaleMin":1,"cpu":{"targetAverageUtilization":80},"enableProtocolSniffingForInbound":false,"enableProtocolSniffingForOutbound":true,"enabled":true,"env":{"GODEBUG":"gctrace=1","PILOT_PUSH_THROTTLE":100},"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"pilot","keepaliveMaxServerConnectionAge":"30m","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"resources":{"requests":{"cpu":"500m","memory":"2048Mi"}},"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","sidecar":true,"tolerations":[],"traceSampling":1},"prometheus":{"contextPath":"/prometheus","enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"hub":"docker.io/prom","image":"prometheus","ingress":{"annotations":null,"enabled":false,"hosts":["prometheus.local"],"tls":null},"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"retention":"6h","scrapeInterval":"15s","security":{"enabled":true},"service":{"annotations":{},"nodePort":{"enabled":false,"port":32090}},"tag":"v2.8.0","tolerations":[]},"security":{"citadelHealthCheck":false,"createMeshPolicy":true,"enableNamespacesByDefault":true,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"citadel","nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","selfSigned":true,"tolerations":[],"workloadCertTtl":"2160h"},"sidecarInjectorWebhook":{"alwaysInjectSelector":[],"enableNamespacesByDefault":false,"enabled":true,"global":{"arch":{"amd64":2,"ppc64le":2,"s390x":2},"configValidation":true,"controlPlaneSecurityEnabled":true,"defaultNodeSelector":{},"defaultPodDisruptionBudget":{"enabled":true},"defaultResources":{"requests":{"cpu":"10m"}},"defaultTolerations":[],"disablePolicyChecks":true,"enableHelmTest":false,"enableTracing":true,"hub":"gcr.io/istio-release","imagePullPolicy":"IfNotPresent","imagePullSecrets":[],"k8sIngress":{"enableHttps":false,"enabled":false,"gatewayName":"ingressgateway"},"localityLbSetting":{"enabled":true},"logging":{"level":"default:info"},"meshExpansion":{"enabled":false,"useILB":false},"meshID":"","meshNetworks":{},"monitoringPort":15014,"mtls":{"enabled":false},"multiCluster":{"clusterName":"","enabled":false},"oneNamespace":false,"outboundTrafficPolicy":{"mode":"ALLOW_ANY"},"policyCheckFailOpen":false,"priorityClassName":"","proxy":{"accessLogEncoding":"TEXT","accessLogFile":"","accessLogFormat":"","autoInject":"enabled","clusterDomain":"cluster.local","componentLogLevel":"","concurrency":2,"dnsRefreshRate":"300s","enableCoreDump":false,"enableCoreDumpImage":"ubuntu:xenial","envoyAccessLogService":{"enabled":false,"host":null,"port":null,"tcpKeepalive":{"interval":"10s","probes":3,"time":"10s"},"tlsSettings":{"caCertificates":null,"clientCertificate":null,"mode":"DISABLE","privateKey":null,"sni":null,"subjectAltNames":[]}},"envoyMetricsService":{"enabled":false,"host":null,"port":null},"envoyStatsd":{"enabled":false,"host":null,"port":null},"excludeIPRanges":"","excludeInboundPorts":"","excludeOutboundPorts":"","image":"proxyv2","includeIPRanges":"*","includeInboundPorts":"*","init":{"resources":{"limits":{"cpu":"100m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"10Mi"}}},"kubevirtInterfaces":"","logLevel":"","privileged":false,"protocolDetectionTimeout":"100ms","readinessFailureThreshold":30,"readinessInitialDelaySeconds":1,"readinessPeriodSeconds":2,"resources":{"limits":{"cpu":"2000m","memory":"1024Mi"},"requests":{"cpu":"100m","memory":"128Mi"}},"statusPort":15020,"tracer":"zipkin"},"proxy_init":{"image":"proxy_init"},"sds":{"enabled":true,"token":{"aud":"istio-ca"},"udsPath":"unix:/var/run/sds/uds_path"},"tag":"release-1.3-latest-daily","tracer":{"datadog":{"address":"$(HOST_IP):8126"},"lightstep":{"accessToken":"","address":"","cacertPath":"","secure":true},"zipkin":{"address":""}},"trustDomain":"","useMCP":true},"image":"sidecar_injector","neverInjectSelector":[],"nodeSelector":{},"podAntiAffinityLabelSelector":[],"podAntiAffinityTermLabelSelector":[],"replicaCount":1,"rewriteAppHTTPProbe":false,"rollingMaxSurge":"100%","rollingMaxUnavailable":"25%","tolerations":[]},"tracing":{"enabled":false}}' -kind: ConfigMap -metadata: - labels: - app: istio - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index 212eae498f..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,137 +0,0 @@ -apiVersion: v1 -data: - mesh: |- - # Set the following variable to true to disable policy checks by the Mixer. - # Note that metrics will still be reported to the Mixer. - disablePolicyChecks: true - # reportBatchMaxEntries is the number of requests that are batched before telemetry data is sent to the mixer server - reportBatchMaxEntries: 100 - # reportBatchMaxTime is the max waiting time before the telemetry data of a request is sent to the mixer server - reportBatchMaxTime: 1s - - # Set enableTracing to false to disable request tracing. - enableTracing: true - - # Set accessLogFile to empty string to disable access log. - accessLogFile: "" - - # If accessLogEncoding is TEXT, value will be used directly as the log format - # example: "[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\n" - # If AccessLogEncoding is JSON, value will be parsed as map[string]string - # example: '{"start_time": "%START_TIME%", "req_method": "%REQ(:METHOD)%"}' - # Leave empty to use default log format - accessLogFormat: "" - - # Set accessLogEncoding to JSON or TEXT to configure sidecar access log - accessLogEncoding: 'TEXT' - - enableEnvoyAccessLogService: false - mixerCheckServer: istio-policy.istio-system.svc.cluster.local:15004 - mixerReportServer: istio-telemetry.istio-system.svc.cluster.local:15004 - # policyCheckFailOpen allows traffic in cases when the mixer policy service cannot be reached. - # Default is false which means the traffic is denied when the client is unable to connect to Mixer. - policyCheckFailOpen: false - # Let Pilot give ingresses the public IP of the Istio ingressgateway - ingressService: istio-ingressgateway - - # Default connect timeout for dynamic clusters generated by Pilot and returned via XDS - connectTimeout: 10s - - # Automatic protocol detection uses a set of heuristics to - # determine whether the connection is using TLS or not (on the - # server side), as well as the application protocol being used - # (e.g., http vs tcp). These heuristics rely on the client sending - # the first bits of data. For server first protocols like MySQL, - # MongoDB, etc., Envoy will timeout on the protocol detection after - # the specified period, defaulting to non mTLS plain TCP - # traffic. Set this field to tweak the period that Envoy will wait - # for the client to send the first bits of data. (MUST BE >=1ms) - protocolDetectionTimeout: 100ms - - # DNS refresh rate for Envoy clusters of type STRICT_DNS - dnsRefreshRate: 300s - - # Unix Domain Socket through which envoy communicates with NodeAgent SDS to get - # key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - sdsUdsPath: "unix:/var/run/sds/uds_path" - - # The trust domain corresponds to the trust root of a system. - # Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain - trustDomain: "" - - # Set the default behavior of the sidecar for handling outbound traffic from the application: - # ALLOW_ANY - outbound traffic to unknown destinations will be allowed, in case there are no - # services or ServiceEntries for the destination port - # REGISTRY_ONLY - restrict outbound traffic to services defined in the service registry as well - # as those defined through ServiceEntries - outboundTrafficPolicy: - mode: ALLOW_ANY - localityLbSetting: - enabled: true - # The namespace to treat as the administrative root namespace for istio - # configuration. - rootNamespace: istio-system - configSources: - - address: istio-galley.istio-system.svc:9901 - tlsSettings: - mode: ISTIO_MUTUAL - - defaultConfig: - # - # TCP connection timeout between Envoy & the application, and between Envoys. Used for static clusters - # defined in Envoy's configuration file - connectTimeout: 10s - # - ### ADVANCED SETTINGS ############# - # Where should envoy's configuration be stored in the istio-proxy container - configPath: "/etc/istio/proxy" - binaryPath: "/usr/local/bin/envoy" - # The pseudo service name used for Envoy. - serviceCluster: istio-proxy - # These settings that determine how long an old Envoy - # process should be kept alive after an occasional reload. - drainDuration: 45s - parentShutdownDuration: 1m0s - # - # The mode used to redirect inbound connections to Envoy. This setting - # has no effect on outbound traffic: iptables REDIRECT is always used for - # outbound connections. - # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. - # The "REDIRECT" mode loses source addresses during redirection. - # If "TPROXY", use iptables TPROXY to redirect to Envoy. - # The "TPROXY" mode preserves both the source and destination IP - # addresses and ports, so that they can be used for advanced filtering - # and manipulation. - # The "TPROXY" mode also configures the sidecar to run with the - # CAP_NET_ADMIN capability, which is required to use TPROXY. - #interceptionMode: REDIRECT - # - # Port where Envoy listens (on local host) for admin commands - # You can exec into the istio-proxy container in a pod and - # curl the admin port (curl http://localhost:15000/) to obtain - # diagnostic information from Envoy. See - # https://lyft.github.io/envoy/docs/operations/admin.html - # for more details - proxyAdminPort: 15000 - # - # Set concurrency to a specific number to control the number of Proxy worker threads. - # If set to 0 (default), then start worker thread for each CPU thread/core. - concurrency: 2 - # - tracing: - zipkin: - # Address of the Zipkin collector - address: zipkin.istio-system:9411 - # - # Mutual TLS authentication between sidecars and istio control plane. - controlPlaneAuthPolicy: MUTUAL_TLS - # - # Address where istio Pilot service is running - discoveryAddress: istio-pilot.istio-system:15011 - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index bab14b0984..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,276 +0,0 @@ -apiVersion: v1 -data: - prometheus.yaml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index f394e916f9..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - name: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 852fd9feff..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - istio: citadel - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index ea2d39ca12..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - istio: galley - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index a590dc8ab9..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - istio: ingressgateway - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - type: NodePort diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 7f7aac66b2..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - istio: pilot - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 92eddb06cd..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 2013882d45..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - name: https-inject - port: 443 - - name: http-monitoring - port: 15014 - selector: - istio: sidecar-injector diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index b02397a061..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - istio: mixer - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index 147fda3aac..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index bfd1afc2a9..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index a1fdfb36c4..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index 7d7230c868..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index 9630e83a84..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml deleted file mode 100644 index 74f7f7a736..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-nodeagent-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: nodeagent - name: istio-nodeagent-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index 066bd7fa6e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index 26c77ce158..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index 3b225d382e..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - istio: sidecar-injector - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 1cb719e1cd..0000000000 --- a/tests/stacks/openshift/application/istio-1-3-1-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/kustomize_test.go b/tests/stacks/openshift/application/istio-stack/kustomize_test.go deleted file mode 100644 index 9544f2f191..0000000000 --- a/tests/stacks/openshift/application/istio-stack/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_stack - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/istio-stack", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index 45f3d51ee0..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - release: istio - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 306a83db93..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: adapter - release: istio - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml deleted file mode 100644 index d0385f0e48..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: apikey - release: istio - name: apikeys.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: apikey - plural: apikeys - singular: apikey - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index b904f823e8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml deleted file mode 100644 index e7f9bb2ca1..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: authorization - release: istio - name: authorizations.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: authorization - plural: authorizations - singular: authorization - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml deleted file mode 100644 index 5d853a10d2..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: bypass - release: istio - name: bypasses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: bypass - plural: bypasses - singular: bypass - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 188a1093cd..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 08e76be423..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml deleted file mode 100644 index f31fc2477e..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: checknothing - release: istio - name: checknothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: checknothing - plural: checknothings - singular: checknothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml deleted file mode 100644 index e5b7194645..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: circonus - release: istio - name: circonuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: circonus - plural: circonuses - singular: circonus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml deleted file mode 100644 index 0c2c35ff0c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: cloudwatch - name: cloudwatches.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: cloudwatch - plural: cloudwatches - singular: cloudwatch - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index dea35ef84c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 366c18ebc7..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - heritage: Tiller - istio: rbac - release: istio - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml deleted file mode 100644 index 9d89ab9c83..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: denier - release: istio - name: deniers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: denier - plural: deniers - singular: denier - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 044b9a80e7..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml deleted file mode 100644 index 3e6d9dc8ef..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: dogstatsd - name: dogstatsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: dogstatsd - plural: dogstatsds - singular: dogstatsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml deleted file mode 100644 index 65099a24de..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: edge - release: istio - name: edges.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: edge - plural: edges - singular: edge - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index ed0739556e..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml deleted file mode 100644 index f3111ccc25..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: fluentd - release: istio - name: fluentds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: fluentd - plural: fluentds - singular: fluentd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index f7420c2f40..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index dab8c75f1b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-handler - package: handler - release: istio - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 1771daadae..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index cbf2f79146..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 9699fa820f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: instance - release: istio - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index a0c186a1d1..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml deleted file mode 100644 index 7b7da141af..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: kubernetesenv - release: istio - name: kubernetesenvs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetesenv - plural: kubernetesenvs - singular: kubernetesenv - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml deleted file mode 100644 index 91693505d6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: adapter.template.kubernetes - release: istio - name: kuberneteses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetes - plural: kuberneteses - singular: kubernetes - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml deleted file mode 100644 index cf59ae38ca..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: listchecker - release: istio - name: listcheckers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listchecker - plural: listcheckers - singular: listchecker - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml deleted file mode 100644 index 04806a76c8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: listentry - release: istio - name: listentries.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listentry - plural: listentries - singular: listentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml deleted file mode 100644 index d1d561e6da..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: logentry - release: istio - name: logentries.config.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.severity - description: The importance of the log entry - name: Severity - type: string - - JSONPath: .spec.timestamp - description: The time value for the log entry - name: Timestamp - type: string - - JSONPath: .spec.monitored_resource_type - description: Optional expression to compute the type of the monitored resource - this log entry is being recorded on - name: Res Type - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: logentry - plural: logentries - singular: logentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml deleted file mode 100644 index c36d6a5e64..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: memquota - release: istio - name: memquotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: memquota - plural: memquotas - singular: memquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 56fcaeb04d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml deleted file mode 100644 index 19a4a519c0..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: metric - release: istio - name: metrics.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: metric - plural: metrics - singular: metric - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml deleted file mode 100644 index c8cadbd41e..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: noop - release: istio - name: noops.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: noop - plural: noops - singular: noop - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml deleted file mode 100644 index 9368360492..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: opa - release: istio - name: opas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: opa - plural: opas - singular: opa - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 06d5359def..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index b9933dfd96..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml deleted file mode 100644 index 07d9e146fc..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: prometheus - release: istio - name: prometheuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: prometheus - plural: prometheuses - singular: prometheus - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml deleted file mode 100644 index df929bfdd9..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: quota - release: istio - name: quotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: quota - plural: quotas - singular: quota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index 7434f2f66d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 53d48ab742..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 7883b0d7c3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml deleted file mode 100644 index a197d882a7..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: rbac - release: istio - name: rbacs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rbac - plural: rbacs - singular: rbac - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml deleted file mode 100644 index 15158d0df6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: redisquota - release: istio - name: redisquotas.config.istio.io -spec: - group: config.istio.io - names: - kind: redisquota - plural: redisquotas - singular: redisquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml deleted file mode 100644 index 899806b3a6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: reportnothing - release: istio - name: reportnothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: reportnothing - plural: reportnothings - singular: reportnothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index 40b5a703e5..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index db8fa18cb8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index 6228a334b0..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index 24d78ee506..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - version: v1alpha1 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index 059355b082..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml deleted file mode 100644 index dfe2f4c61e..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: signalfx - release: istio - name: signalfxs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: signalfx - plural: signalfxs - singular: signalfx - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml deleted file mode 100644 index 6b758b40d9..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: solarwinds - release: istio - name: solarwindses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: solarwinds - plural: solarwindses - singular: solarwinds - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml deleted file mode 100644 index c3e9b39dcd..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stackdriver - release: istio - name: stackdrivers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stackdriver - plural: stackdrivers - singular: stackdriver - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml deleted file mode 100644 index 7b3da3e069..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: statsd - release: istio - name: statsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: statsd - plural: statsds - singular: statsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml deleted file mode 100644 index 1918fa9b19..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stdio - release: istio - name: stdios.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stdio - plural: stdios - singular: stdio - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 60c365f949..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-template - package: template - release: istio - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml deleted file mode 100644 index 677ffc60bb..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: tracespan - release: istio - name: tracespans.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: tracespan - plural: tracespans - singular: tracespan - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index fa7f9a0d80..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - version: v1alpha3 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml deleted file mode 100644 index cfd1f91152..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: zipkin - name: zipkins.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: zipkin - plural: zipkins - singular: zipkin - scope: Namespaced - version: v1alpha2 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml deleted file mode 100644 index b4fba3181f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_grafana.yaml +++ /dev/null @@ -1,152 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: GRAFANA_PORT - value: "3000" - - name: GF_AUTH_BASIC_ENABLED - value: "false" - - name: GF_AUTH_ANONYMOUS_ENABLED - value: "true" - - name: GF_AUTH_ANONYMOUS_ORG_ROLE - value: Admin - - name: GF_PATHS_DATA - value: /data/grafana - image: grafana/grafana:6.0.2 - imagePullPolicy: IfNotPresent - name: grafana - ports: - - containerPort: 3000 - readinessProbe: - httpGet: - path: /login - port: 3000 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /data/grafana - name: data - - mountPath: /var/lib/grafana/dashboards/istio/galley-dashboard.json - name: dashboards-istio-galley-dashboard - readOnly: true - subPath: galley-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-mesh-dashboard.json - name: dashboards-istio-istio-mesh-dashboard - readOnly: true - subPath: istio-mesh-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-performance-dashboard.json - name: dashboards-istio-istio-performance-dashboard - readOnly: true - subPath: istio-performance-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-service-dashboard.json - name: dashboards-istio-istio-service-dashboard - readOnly: true - subPath: istio-service-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-workload-dashboard.json - name: dashboards-istio-istio-workload-dashboard - readOnly: true - subPath: istio-workload-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/mixer-dashboard.json - name: dashboards-istio-mixer-dashboard - readOnly: true - subPath: mixer-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/pilot-dashboard.json - name: dashboards-istio-pilot-dashboard - readOnly: true - subPath: pilot-dashboard.json - - mountPath: /etc/grafana/provisioning/datasources/datasources.yaml - name: config - subPath: datasources.yaml - - mountPath: /etc/grafana/provisioning/dashboards/dashboardproviders.yaml - name: config - subPath: dashboardproviders.yaml - securityContext: - fsGroup: 472 - runAsUser: 472 - volumes: - - configMap: - name: istio-grafana - name: config - - emptyDir: {} - name: data - - configMap: - name: istio-grafana-configuration-dashboards-galley-dashboard - name: dashboards-istio-galley-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - name: dashboards-istio-istio-mesh-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - name: dashboards-istio-istio-performance-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-service-dashboard - name: dashboards-istio-istio-service-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - name: dashboards-istio-istio-workload-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-mixer-dashboard - name: dashboards-istio-mixer-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-pilot-dashboard - name: dashboards-istio-pilot-dashboard diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 8cf48324fd..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --append-dns-names=true - - --grpc-port=8060 - - --grpc-hostname=citadel - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - image: docker.io/istio/citadel:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml deleted file mode 100644 index 82a3fce5a3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml +++ /dev/null @@ -1,171 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-egressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-certs - name: egressgateway-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-ca-certs - name: egressgateway-ca-certs - readOnly: true - serviceAccountName: istio-egressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-egressgateway-service-account - - name: egressgateway-certs - secret: - optional: true - secretName: istio-egressgateway-certs - - name: egressgateway-ca-certs - secret: - optional: true - secretName: istio-egressgateway-ca-certs diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 9bdf1a9c23..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=true - - --validation-webhook-config-file - - /etc/config/validatingwebhookconfiguration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - - --enable-validation=true - image: docker.io/istio/galley:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 01d4547b36..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,177 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 3eaa8c4269..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "100" - - name: PILOT_DISABLE_XDS_MARSHALING_TO_ANY - value: "1" - image: docker.io/istio/pilot:1.1.6 - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - limits: - cpu: 100m - memory: 200Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - serviceAccountName: istio-pilot-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 204884f48a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,168 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index a7d7af79d5..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: docker.io/istio/sidecar_injector:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - name: istio-sidecar-injector - name: inject-config diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index e848f4ba90..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,172 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 50m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml deleted file mode 100644 index a67c51e985..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_istio-tracing.yaml +++ /dev/null @@ -1,99 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: istio-tracing - namespace: istio-system -spec: - selector: - matchLabels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - template: - metadata: - annotations: - prometheus.io/path: /jaeger/metrics - prometheus.io/port: "16686" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: COLLECTOR_ZIPKIN_HTTP_PORT - value: "9411" - - name: MEMORY_MAX_TRACES - value: "50000" - - name: QUERY_BASE_PATH - value: /jaeger - image: docker.io/jaegertracing/all-in-one:1.9 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: / - port: 16686 - name: jaeger - ports: - - containerPort: 9411 - - containerPort: 16686 - - containerPort: 5775 - protocol: UDP - - containerPort: 6831 - protocol: UDP - - containerPort: 6832 - protocol: UDP - readinessProbe: - httpGet: - path: / - port: 16686 - resources: - requests: - cpu: 10m diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml deleted file mode 100644 index 6bbccb9b25..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_kiali.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: kiali - template: - metadata: - annotations: - prometheus.io/port: "9090" - prometheus.io/scrape: "true" - scheduler.alpha.kubernetes.io/critical-pod: "" - sidecar.istio.io/inject: "false" - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /opt/kiali/kiali - - -config - - /kiali-configuration/config.yaml - - -v - - "4" - env: - - name: ACTIVE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: PROMETHEUS_SERVICE_URL - value: http://prometheus:9090 - - name: SERVER_WEB_ROOT - value: /kiali - image: docker.io/kiali/kiali:v0.16 - name: kiali - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /kiali-configuration - name: kiali-configuration - - mountPath: /kiali-secret - name: kiali-secret - serviceAccountName: kiali-service-account - volumes: - - configMap: - name: kiali - name: kiali-configuration - - name: kiali-secret - secret: - optional: true - secretName: kiali diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index 613cd2fe17..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,93 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yml - image: docker.io/prom/prometheus:v2.3.1 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml deleted file mode 100644 index cdbeef32e3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-egressgateway diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index c5a6bdd2d8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 1c3bd0a78a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index f33a22eeca..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index 8fc6b67d67..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml deleted file mode 100644 index e3cf64d5b2..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "3" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - -c - - | - kubectl get secret --all-namespaces | grep "istio.io/key-and-cert" | while read -r entry; do - ns=$(echo $entry | awk '{print $1}'); - name=$(echo $entry | awk '{print $2}'); - kubectl delete secret $name -n $ns; - done - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - restartPolicy: OnFailure - serviceAccountName: istio-cleanup-secrets-service-account diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml deleted file mode 100644 index 79d95f8258..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: istio-grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/grafana/run.sh - - /tmp/grafana/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - name: kubectl - volumeMounts: - - mountPath: /tmp/grafana - name: tmp-configmap-grafana - restartPolicy: OnFailure - serviceAccountName: istio-grafana-post-install-account - volumes: - - configMap: - name: istio-grafana-custom-resources - name: tmp-configmap-grafana diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml deleted file mode 100644 index f907dee1af..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/run.sh - - /tmp/security/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index d475e6bc55..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,138 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 6b39cc0347..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 41928afff6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv - params: null diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 7558b99229..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,216 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml deleted file mode 100644 index 2baf4e9096..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - compiledAdapter: stdio - params: - outputAsJson: true diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml deleted file mode 100644 index 1e66576783..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: kubernetes -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: attributes - namespace: istio-system -spec: - attribute_bindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml deleted file mode 100644 index c4098d4e17..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: accesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: request.time - variables: - apiClaims: request.auth.raw_claims | "" - apiKey: request.api_key | request.headers["x-api-key"] | "" - clientTraceId: request.headers["x-client-trace-id"] | "" - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - grpcMessage: response.grpc_message | "" - grpcStatus: response.grpc_status | "" - httpAuthority: request.headers[":authority"] | request.host | "" - latency: response.duration | "0ms" - method: request.method | "" - permissiveResponseCode: rbac.permissive.response_code | "none" - permissiveResponsePolicyID: rbac.permissive.effective_policy_id | "none" - protocol: request.scheme | context.protocol | "http" - receivedBytes: request.total_size | 0 - referer: request.referer | "" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestId: request.headers["x-request-id"] | "" - requestSize: request.size | 0 - requestedServerName: connection.requested_server_name | "" - responseCode: response.code | 0 - responseFlags: context.proxy_error_code | "" - responseSize: response.size | 0 - responseTimestamp: response.time - sentBytes: response.total_size | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - url: request.path | "" - userAgent: request.useragent | "" - xForwardedFor: request.headers["x-forwarded-for"] | "0.0.0.0" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml deleted file mode 100644 index 797b01697d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpaccesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: context.time | timestamp("2017-01-01T00:00:00Z") - variables: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - connectionDuration: connection.duration | "0ms" - connectionEvent: connection.event | "" - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - protocol: context.protocol | "tcp" - receivedBytes: connection.received.bytes | 0 - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestedServerName: connection.requested_server_name | "" - responseFlags: context.proxy_error_code | "" - sentBytes: connection.sent.bytes | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - totalReceivedBytes: connection.received.bytes_total | 0 - totalSentBytes: connection.sent.bytes_total | 0 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml deleted file mode 100644 index 5aa199b236..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestcount - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml deleted file mode 100644 index 914e4d4b5a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestduration - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml deleted file mode 100644 index 155343600d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestsize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml deleted file mode 100644 index d3aafb93c3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: responsesize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml deleted file mode 100644 index 33e8f468b9..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytereceived - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml deleted file mode 100644 index 39df34138c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytesent - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml deleted file mode 100644 index f2b80ce1d8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsclosed - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml deleted file mode 100644 index 68dbbf0c9c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsopened - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 16f89c981d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 6ba4b19caa..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount.metric - - requestduration.metric - - requestsize.metric - - responsesize.metric - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index 74466f18be..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent.metric - - tcpbytereceived.metric - match: context.protocol == "tcp" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 4414aa902c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index 5d119b596e..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml deleted file mode 100644 index 2d272125d1..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - accesslog.logentry - match: context.protocol == "http" || context.protocol == "grpc" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml deleted file mode 100644 index 339c38a2bd..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdiotcp - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - tcpaccesslog.logentry - match: context.protocol == "tcp" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 7e713777c2..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes - match: context.protocol == "tcp" diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 4bc62dd7f8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index 97db246c89..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml deleted file mode 100644 index a1c5f6ab12..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-egressgateway - istio: egressgateway - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 9a384b903b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 579d4ec2e0..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 73bd8933ad..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ac4f6464a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index ee5c3a1dee..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - release: istio diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index cb57ab8639..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index b31002df62..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - list - - delete diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 14745dd1b5..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index 31cd021e86..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,85 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml deleted file mode 100644 index f38f3710ac..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index ce57730853..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index 4c406989f2..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fbf58bcdd1..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index 06d72de038..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml deleted file mode 100644 index a00bd03674..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-viewer -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - servicecontrolreports - - servicecontrols - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - get - - list - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml deleted file mode 100644 index de91e8f85c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 4e42dfb6a6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index 28ac035ab6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index fcc37b18d8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "2" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-cleanup-secrets-istio-system -subjects: -- kind: ServiceAccount - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 291dd013b8..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-egressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 9c2ca1a82c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 473c34c42b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-grafana-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index c4b2804104..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-ingressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml deleted file mode 100644 index d1db23758b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: istio-kiali-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kiali -subjects: -- kind: ServiceAccount - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 8c801ce56f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index b7cccaacb3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - chart: istio-1.1.0 - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index fc78ced111..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index fc5d7a83d6..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index 455f52e864..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 57718cea6d..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 725830af27..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml deleted file mode 100644 index 9f021fb1e7..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/route.openshift.io_v1_route_istio-ingressgateway.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: route.openshift.io/v1 -kind: Route -metadata: - labels: - app: istio-ingressgateway - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - port: - targetPort: http2 - to: - kind: Service - name: istio-ingressgateway - weight: 100 - wildcardPolicy: None diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index cc77485872..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,123 +0,0 @@ -apiVersion: v1 -data: - validatingwebhookconfiguration.yaml: |- - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - namespace: istio-system - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - failurePolicy: Fail -kind: ConfigMap -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml deleted file mode 100644 index c7b460e359..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml +++ /dev/null @@ -1,341 +0,0 @@ -apiVersion: v1 -data: - galley-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- - Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", - "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 0 }, "id": 46, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"galley\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Galley Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 5 }, "id": 40, "panels": [], "title": "Resource Usage", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": - 6 }, "id": 36, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "process_virtual_memory_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Virtual Memory", - "refId": "A" }, { "expr": "process_resident_memory_bytes{job=\"galley\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", "refId": - "B" }, { "expr": "go_memstats_heap_sys_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "heap sys", "refId": "C" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "heap alloc", "refId": - "D" }, { "expr": "go_memstats_alloc_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F" }, { "expr": "go_memstats_heap_inuse_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": - "G" }, { "expr": "go_memstats_stack_inuse_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "H" }, { "expr": - "sum(container_memory_usage_bytes{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Total (kis)", "refId": - "E" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 6, "y": 6 }, "id": 38, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"}[1m]))", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": - "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}[1m])) by (container_name)", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B" - }, { "expr": "irate(process_cpu_seconds_total{job=\"galley\"}[1m])", "format": - "time_series", "intervalFactor": 2, "legendFormat": "galley (self-reported)", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 12, "y": 6 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"galley\"}", "format": "time_series", "intervalFactor": - 2, "legendFormat": "Open FDs (galley)", "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }} ", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeRegions": [], "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 6 }, "id": - 44, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "goroutines_total", - "refId": "A" }, { "expr": "galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "clients_total", "refId": "B" }, { "expr": - "go_goroutines{job=\"galley\"}/galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "avg_goroutines_per_client", "refId": "C" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 14 }, "id": 10, "panels": [], "title": "Runtime", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 15 }, "id": - 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(galley_runtime_strategy_on_change_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Strategy - Change Events", "refId": "A" }, { "expr": "sum(rate(galley_runtime_processor_events_processed_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Processed - Events", "refId": "B" }, { "expr": "sum(rate(galley_runtime_processor_snapshots_published_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Snapshot - Published", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Event Rates", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": "Events/min", "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": "", "logBase": 1, "max": null, "min": null, - "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 15 }, "id": 4, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(galley_runtime_strategy_timer_max_time_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Max Time - Reached", "refId": "A" }, { "expr": "sum(rate(galley_runtime_strategy_timer_quiesce_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Quiesce - Reached", "refId": "B" }, { "expr": "sum(rate(galley_runtime_strategy_timer_resets_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Timer Resets", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Timer Rates", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 15 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 3, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.50, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P50", "refId": - "A" }, { "expr": "histogram_quantile(0.90, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P90", "refId": - "B" }, { "expr": "histogram_quantile(0.95, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P95", "refId": - "C" }, { "expr": "histogram_quantile(0.99, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P99", "refId": - "D" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Events Per Snapshot", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by (typeURL) (galley_runtime_state_type_instances_total)", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ typeURL }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "State Type - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Count", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 27 }, "id": 34, "panels": [], "title": "Validation", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": - 28 }, "id": 28, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "galley_validation_cert_key_updates{job=\"galley\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Key Updates", "refId": - "A" }, { "expr": "galley_validation_cert_key_update_errors{job=\"galley\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Key Update Errors: {{ error - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], - "timeShift": null, "title": "Validation Webhook Certificate", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 28 }, "id": 30, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_passed{job=\"galley\"}) by (group, - version, resource)", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Passed: {{ group }}/{{ version }}/{{resource}}", "refId": "A" }, { "expr": "sum(galley_validation_failed{job=\"galley\"}) - by (group, version, resource, reason)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Failed: {{ group }}/{{ version }}/{{resource}} ({{ reason}})", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Resource Validation", "tooltip": { "shared": true, "sort": 0, - "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": - "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } - ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": - false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": - 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": 28 }, "id": 32, "legend": { "avg": - false, "current": false, "max": false, "min": false, "show": true, "total": false, - "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_http_error{job=\"galley\"}) by (status)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ status }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Validation HTTP Errors", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 34 }, "id": 12, "panels": [], "title": - "Kubernetes Source", "type": "row" }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 0, "y": 35 }, "id": 14, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_event_success_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Success", "refId": "A" }, { "expr": "rate(galley_source_kube_event_error_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Source Event Rate", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 35 }, "id": 16, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_dynamic_converter_success_total[1m]) * 60", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{apiVersion=\"{{apiVersion}}\",group=\"{{group}}\",kind=\"{{kind}}\"}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Successes", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Conversions/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": - 35 }, "id": 24, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(galley_source_kube_dynamic_converter_failure_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Failures", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Failures/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "collapsed": false, "gridPos": { "h": 1, "w": 24, "x": 0, "y": 41 - }, "id": 18, "panels": [], "title": "Mesh Configuration Protocol", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 42 }, "id": - 20, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(galley_mcp_source_clients_total)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Clients", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Connected Clients", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 42 }, "id": 22, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by(collection)(irate(galley_mcp_source_request_acks_total[1m]) * 60)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Request - ACKs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": "ACKs/min", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 42 }, "id": 26, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_mcp_source_request_nacks_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Request NACKs", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "NACKs/min", "logBase": 1, "max": null, "min": null, - "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, - "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } - } ], "refresh": "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": - { "list": [] }, "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Galley Dashboard", "uid": "TSEY6jLmk", "version": 1 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-galley-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml deleted file mode 100644 index 8be80d7176..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: v1 -data: - istio-mesh-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "singlestat", "name": - "Singlestat", "version": "5.0.0" }, { "type": "panel", "id": "table", "name": - "Table", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "content": - "
\n
\n Istio\n
\n
\n Istio - is an open platform - that provides a uniform way to connect,\n manage, and \n secure microservices.\n
\n Need help? Join the - Istio community.\n
\n
", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "50px", "id": 13, "links": - [], "mode": "html", "style": { "font-size": "18pt" }, "title": "", "transparent": - true, "type": "text" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": - false, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "datasource": "Prometheus", "format": "ops", "gauge": { "maxValue": - 100, "minValue": 0, "show": false, "thresholdLabels": false, "thresholdMarkers": - true }, "gridPos": { "h": 3, "w": 6, "x": 0, "y": 3 }, "id": 20, "interval": null, - "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", "value": - 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": - "connected", "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": - "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": - "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, - "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": "", "targets": - [ { "expr": "round(sum(irate(istio_requests_total{reporter=\"destination\"}[1m])), - 0.001)", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": "", "title": - "Global Request Volume", "transparent": false, "type": "singlestat", "valueFontSize": - "80%", "valueMaps": [ { "op": "=", "text": "N/A", "value": "null" } ], "valueName": - "avg" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": false, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "datasource": "Prometheus", "format": "percentunit", "gauge": { - "maxValue": 100, "minValue": 80, "show": false, "thresholdLabels": false, "thresholdMarkers": - false }, "gridPos": { "h": 3, "w": 6, "x": 6, "y": 3 }, "id": 21, "interval": - null, "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", - "value": 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, - "nullPointMode": "connected", "nullText": null, "postfix": "", "postfixFontSize": - "50%", "prefix": "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", - "text": "N/A", "to": "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, - 0.18)", "full": true, "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": - "", "targets": [ { "expr": "sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) / sum(rate(istio_requests_total{reporter=\"destination\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": - "95, 99, 99.5", "title": "Global Success Rate (non-5xx responses)", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 12, "y": 3 }, "id": 22, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"4.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "4xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 18, "y": 3 }, "id": 23, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"5.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "5xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "columns": [], "datasource": - "Prometheus", "fontSize": "100%", "gridPos": { "h": 21, "w": 24, "x": 0, "y": - 6 }, "hideTimeOverride": false, "id": 73, "links": [], "pageSize": null, "repeat": - null, "repeatDirection": "v", "scroll": true, "showHeader": true, "sort": { "col": - 4, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": false, "linkTargetBlank": - false, "linkTooltip": "Workload dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_2&var-workload=$__cell_", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": - "Time", "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Requests", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [], "type": "number", "unit": "ops" }, - { "alias": "P50 Latency", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "Value #B", "thresholds": [], "type": "number", - "unit": "s" }, { "alias": "P90 Latency", "colorMode": null, "colors": [ "rgba(245, - 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #D", "thresholds": [], - "type": "number", "unit": "s" }, { "alias": "P99 Latency", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value - #E", "thresholds": [], "type": "number", "unit": "s" }, { "alias": "Success Rate", - "colorMode": "cell", "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, - 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #F", "thresholds": [ ".95", " 1.00" ], "type": "number", - "unit": "percentunit" }, { "alias": "Workload", "colorMode": null, "colors": [ - "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": - "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-workload=$__cell_2&var-namespace=$__cell_3", - "pattern": "destination_workload_var", "thresholds": [], "type": "number", "unit": - "short" }, { "alias": "Service", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": "$__cell dashboard", - "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", "pattern": - "destination_service", "thresholds": [], "type": "string", "unit": "short" }, - { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, - 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", - "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": [], - "type": "hidden", "unit": "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_requests_total{reporter=\"destination\", - response_code=\"200\"}[1m])) by (destination_workload, destination_workload_namespace, - destination_service), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "intervalFactor": 1, "legendFormat": "{{ destination_workload}}.{{ destination_workload_namespace - }}", "refId": "A" }, { "expr": "label_join(histogram_quantile(0.50, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload}}.{{ destination_workload_namespace }}", "refId": "B" - }, { "expr": "label_join(histogram_quantile(0.90, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "D" - }, { "expr": "label_join(histogram_quantile(0.99, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "E" - }, { "expr": "label_join((sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) by (destination_workload, destination_workload_namespace) - / sum(rate(istio_requests_total{reporter=\"destination\"}[1m])) by (destination_workload, - destination_workload_namespace)), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "interval": "", "intervalFactor": 1, "legendFormat": "{{ destination_workload - }}.{{ destination_workload_namespace }}", "refId": "F" } ], "timeFrom": null, - "title": "HTTP/GRPC Workloads", "transform": "table", "transparent": false, "type": - "table" }, { "columns": [], "datasource": "Prometheus", "fontSize": "100%", "gridPos": - { "h": 18, "w": 24, "x": 0, "y": 27 }, "hideTimeOverride": false, "id": 109, "links": - [], "pageSize": null, "repeatDirection": "v", "scroll": true, "showHeader": true, - "sort": { "col": 2, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": - false, "linkTargetBlank": false, "linkTooltip": "$__cell dashboard", "linkUrl": - "/dashboard/db/istio-tcp-workload-dashboard?var-namespace=$__cell_2&&var-workload=$__cell", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Bytes Sent", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [ "" ], "type": "number", "unit": "Bps" - }, { "alias": "Bytes Received", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #C", "thresholds": [], - "type": "number", "unit": "Bps" }, { "alias": "", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Time", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Workload", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_3&var-workload=$__cell_2", - "pattern": "destination_workload_var", "thresholds": [], "type": "string", "unit": - "short" }, { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Service", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", - "pattern": "destination_service", "thresholds": [], "type": "number", "unit": - "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_tcp_received_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "C" }, { "expr": "label_join(sum(rate(istio_tcp_sent_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "A" } ], "timeFrom": null, "title": "TCP - Workloads", "transform": "table", "transparent": false, "type": "table" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 24, "x": 0, "y": 45 }, "id": 111, "legend": - { "alignAsTable": false, "avg": false, "current": false, "max": false, "min": - false, "rightSide": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(istio_build) by (component, tag)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ component }}: {{ tag }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Istio Components by Version", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "transparent": - false, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Mesh - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml deleted file mode 100644 index 0d56502d7a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml +++ /dev/null @@ -1,150 +0,0 @@ -apiVersion: v1 -data: - istio-performance-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 12, "x": 0, "y": 0 }, "id": 2, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m])) - / (round(sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m])), 0.001)/1000)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "istio-ingressgateway", "refId": "B" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", - "refId": "C" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU / 1k rps", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 12, "y": 0 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-ingressgateway", - "refId": "B" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", "refId": - "C" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 0, "y": 9 }, "id": 4, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "(sum(container_memory_usage_bytes{pod_name=~\"istio-telemetry-.*\"}) / (sum(irate(istio_requests_total[1m])) - / 1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry - / 1k rps", "refId": "A" }, { "expr": "sum(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\"}) - / count(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\",container_name!=\"POD\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-ingressgateway", - "refId": "C" }, { "expr": "sum(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"}) - / count(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-proxy", - "refId": "B" }, { "expr": "(sum(container_memory_usage_bytes{pod_name=~\"istio-policy-.*\"}) - / (sum(irate(istio_requests_total[1m])) / 1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy - / 1k rps", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "decbytes", "label": - null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 9, "w": 12, "x": 12, "y": 9 }, "id": 5, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-telemetry\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-telemetry\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m]))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "istio-ingressgateway", "refId": "C" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_response_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m])) + sum(irate(istio_request_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_request_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m]))", "format": "time_series", "intervalFactor": 1, - "legendFormat": "istio-proxy", "refId": "D" }, { "expr": "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-policy\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-policy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "E" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Bytes transferred / sec", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 24, "x": 0, "y": 18 }, "id": 8, "legend": { "alignAsTable": false, "avg": - false, "current": false, "max": false, "min": false, "rightSide": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build) by (component, - tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ component - }}: {{ tag }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Istio Components by Version", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "transparent": false, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "The charts on this dashboard are intended to show Istio - main components cost in terms resources utilization under steady load.\n\n- **vCPU/1k - rps:** shows vCPU utilization by the main Istio components normalized by 1000 - requests/second. When idle or low traffic, this chart will be blank. The curve - for istio-proxy refers to the services sidecars only. \n- **vCPU:** vCPU utilization - by Istio components, not normalized.\n- **Memory:** memory footprint for the components. - Telemetry and policy are normalized by 1k rps, and no data is shown when there - is no traffic. For ingress and istio-proxy, the data is per instance. \n- **Bytes - transferred/ sec:** shows the number of bytes flowing through each Istio component.", - "gridPos": { "h": 4, "w": 24, "x": 0, "y": 18 }, "id": 11, "links": [], "mode": - "markdown", "title": "Istio Performance Dashboard Readme", "type": "text" } ], - "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": [] }, - "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Performance Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml deleted file mode 100644 index d39f3a822a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml +++ /dev/null @@ -1,795 +0,0 @@ -apiVersion: v1 -data: - istio-service-dashboard.json: "{ \"annotations\": { \"list\": [ { \"builtIn\": 1, - \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": true, \"iconColor\": - \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", \"type\": \"dashboard\" - } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": 0, \"iteration\": - 1536442501501, \"links\": [], \"panels\": [ { \"content\": \"
\\nSERVICE: $service\\n
\", \"gridPos\": { \"h\": - 3, \"w\": 24, \"x\": 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", - \"title\": \"\", \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": - null, \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"rgba(245, - 54, 54, 0.9)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": - \"Prometheus\", \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Client Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 3 }, \"id\": 14, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Client Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Client Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 3 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m]))\", \"format\": \"time_series\", \"hide\": - false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" } ], \"thresholds\": - \"\", \"title\": \"TCP Received Bytes\", \"transparent\": false, \"type\": \"singlestat\", - \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", - \"value\": \"null\" } ], \"valueName\": \"avg\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 7 }, \"id\": 97, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Server Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 7 }, \"id\": 98, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Server Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 7 }, \"id\": 99, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Server Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 7 }, \"id\": 100, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m])) \", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Sent Bytes\", \"transparent\": false, - \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": - \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" }, { - \"content\": \"
\\nCLIENT - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"source\\\",source_workload=~\\\"$srcwl\\\",source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"source\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace }} : - {{ response_code }}\", \"refId\": \"A\", \"step\": 2 } ], \"thresholds\": [], - \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Requests by Source - And Response Code\", \"tooltip\": { \"shared\": false, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": - [ { \"format\": \"ops\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"description\": \"\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 20 }, \"id\": - 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, \"rightSide\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 20 }, \"id\": - 68, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": - 80, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, - \"alignLevel\": null } }, { \"content\": \"
\\nSERVICE - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 32 }, \"id\": 69, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 35 }, \"id\": 90, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"destination\\\",destination_workload=~\\\"$dstwl\\\",destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace, response_code), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"destination\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[5m])) by (destination_workload, - destination_workload_namespace, response_code), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }}\", \"refId\": \"A\", - \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Incoming Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null - } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 12, \"y\": 35 }, \"id\": 91, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", - \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], - \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming - Success Rate (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 41 }, \"id\": 94, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 95, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 96, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 92, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace}} (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace}}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Bytes Received from - Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": - true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, - \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, \"alignLevel\": - null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 12, \"x\": 12, \"y\": 47 }, \"id\": 93, \"legend\": { \"avg\": false, \"current\": - false, \"max\": false, \"min\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } } ], \"refresh\": \"10s\", \"schemaVersion\": - 16, \"style\": \"dark\", \"tags\": [], \"templating\": { \"list\": [ { \"allValue\": - null, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": false, \"label\": - \"Service\", \"multi\": false, \"name\": \"service\", \"options\": [], \"query\": - \"label_values(destination_service)\", \"refresh\": 1, \"regex\": \"\", \"sort\": - 0, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", - \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": \"All\", - \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": - true, \"label\": \"Client Workload Namespace\", \"multi\": true, \"name\": \"srcns\", - \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (source_workload_namespace) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\"}) by (source_workload_namespace))\", \"refresh\": - 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": { \"text\": \"All\", \"value\": \"$__all\" - }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": - \"Client Workload\", \"multi\": true, \"name\": \"srcwl\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", source_workload_namespace=~\\\"$srcns\\\"}) - by (source_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload Namespace\", \"multi\": true, - \"name\": \"dstns\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (destination_workload_namespace) or - sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\"}) - by (destination_workload_namespace))\", \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", - \"sort\": 2, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload\", \"multi\": true, \"name\": - \"dstwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Service Dashboard\", \"uid\": \"LJ_uJAvmk\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-service-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml deleted file mode 100644 index a3022b2cab..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml +++ /dev/null @@ -1,744 +0,0 @@ -apiVersion: v1 -data: - istio-workload-dashboard.json: "{ \"__inputs\": [ { \"name\": \"DS_PROMETHEUS\", - \"label\": \"Prometheus\", \"description\": \"\", \"type\": \"datasource\", \"pluginId\": - \"prometheus\", \"pluginName\": \"Prometheus\" } ], \"__requires\": [ { \"type\": - \"grafana\", \"id\": \"grafana\", \"name\": \"Grafana\", \"version\": \"5.0.4\" - }, { \"type\": \"panel\", \"id\": \"graph\", \"name\": \"Graph\", \"version\": - \"5.0.0\" }, { \"type\": \"datasource\", \"id\": \"prometheus\", \"name\": \"Prometheus\", - \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"singlestat\", \"name\": - \"Singlestat\", \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"text\", - \"name\": \"Text\", \"version\": \"5.0.0\" } ], \"annotations\": { \"list\": [ - { \"builtIn\": 1, \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": - true, \"iconColor\": \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", - \"type\": \"dashboard\" } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": - 0, \"id\": null, \"iteration\": 1531345461465, \"links\": [], \"panels\": [ { - \"content\": \"
\\nWORKLOAD: - $workload.$namespace\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": - 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", \"title\": \"\", - \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 8, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Incoming Request Volume\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"current\" }, { \"cacheTimeout\": null, \"colorBackground\": false, - \"colorValue\": false, \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(245, 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", - \"decimals\": null, \"format\": \"percentunit\", \"gauge\": { \"maxValue\": 100, - \"minValue\": 80, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": - false }, \"gridPos\": { \"h\": 4, \"w\": 8, \"x\": 8, \"y\": 3 }, \"id\": 14, - \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": - \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 - } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": null, - \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Incoming Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 8, - \"x\": 16, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"interval\": \"\", \"intervalFactor\": 1, \"legendFormat\": - \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P90\", - \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P99\", - \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Request Duration\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"cacheTimeout\": null, - \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"#299c46\", - \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": - \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": - false, \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": - 0, \"y\": 7 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": - 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": - \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": - \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", - \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": \"null\", - \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": \"rgba(31, - 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", \"show\": - true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\"}[1m])) - + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\"}[1m]))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Server Traffic\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": - \"Prometheus\", \"format\": \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": 12, \"y\": 7 }, \"id\": 85, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\"}[1m])) + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\"}[1m]))\", - \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"\", \"refId\": \"A\" } ], \"thresholds\": \"\", \"title\": \"TCP Client Traffic\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"avg\" }, { \"content\": \"
\\nINBOUND - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - source_workload }}.{{ source_workload_namespace }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Requests by Source And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 20 }, \"id\": 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 8, \"x\": 16, \"y\": 20 }, \"id\": 68, \"legend\": { \"alignAsTable\": false, - \"avg\": false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": - false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": false - }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Response Size By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"decbytes\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", - \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, - \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": - 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": 80, \"legend\": - { \"avg\": false, \"current\": false, \"max\": false, \"min\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}} - (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"content\": - \"
\\nOUTBOUND SERVICES\\n
\", - \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": 32 }, \"id\": 69, \"links\": - [], \"mode\": \"html\", \"title\": \"\", \"transparent\": true, \"type\": \"text\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 0, \"y\": 35 }, \"id\": 70, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"max\": false, \"min\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null as zero\", \"percentage\": false, \"pointradius\": 5, - \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, - \"legendFormat\": \"{{ destination_service }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 35 }, \"id\": 71, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Outgoing Success Rate (non-5xx responses) By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"description\": \"\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 41 }, \"id\": 72, \"legend\": { \"alignAsTable\": - false, \"avg\": false, \"current\": false, \"hideEmpty\": true, \"hideZero\": - false, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": - false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": - false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Duration by Destination\", \"tooltip\": { - \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 73, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 74, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 76, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent on Outgoing TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 47 }, \"id\": - 78, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Received from Outgoing TCP Connection\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] } ], \"refresh\": - \"10s\", \"schemaVersion\": 16, \"style\": \"dark\", \"tags\": [], \"templating\": - { \"list\": [ { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", - \"hide\": 0, \"includeAll\": false, \"label\": \"Namespace\", \"multi\": false, - \"name\": \"namespace\", \"options\": [], \"query\": \"query_result(sum(istio_requests_total) - by (destination_workload_namespace) or sum(istio_tcp_sent_bytes_total) by (destination_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*_namespace=\\\"([^\\\"]*).*/\", \"sort\": 0, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": false, \"label\": \"Workload\", \"multi\": false, \"name\": - \"workload\", \"options\": [], \"query\": \"query_result((sum(istio_requests_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_requests_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)) or (sum(istio_tcp_sent_bytes_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 1, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": {}, \"datasource\": - \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": \"Inbound Workload - Namespace\", \"multi\": true, \"name\": \"srcns\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace) - or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Inbound Workload\", \"multi\": true, \"name\": - \"srcwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload))\", \"refresh\": - 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", \"sort\": 3, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Destination Service\", \"multi\": true, - \"name\": \"dstsvc\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service) or sum(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service))\", \"refresh\": 1, \"regex\": \"/.*destination_service=\\\"([^\\\"]*).*/\", - \"sort\": 4, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Workload Dashboard\", \"uid\": \"UbsSZTDik\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml deleted file mode 100644 index 9a7f42a256..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml +++ /dev/null @@ -1,359 +0,0 @@ -apiVersion: v1 -data: - mixer-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "limit": - 100, "name": "Annotations & Alerts", "showIn": 0, "type": "dashboard" } ] }, "editable": - false, "gnetId": null, "graphTooltip": 1, "id": null, "iteration": 1543881232533, - "links": [], "panels": [ { "content": "

Deployed Versions

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "40", "id": 62, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 3 }, "id": 64, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"mixer\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Mixer Versions", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "

Resource Usage

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(process_virtual_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "instant": false, "intervalFactor": 2, "legendFormat": - "Virtual Memory ({{ job }})", "refId": "I" }, { "expr": "sum(process_resident_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident - Memory ({{ job }})", "refId": "H" }, { "expr": "sum(go_memstats_heap_sys_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap sys ({{ job }})", "refId": "A" }, { "expr": "sum(go_memstats_heap_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap alloc ({{ job }})", "refId": "D" }, { "expr": "sum(go_memstats_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Alloc - ({{ job }})", "refId": "F" }, { "expr": "sum(go_memstats_heap_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "Heap in-use ({{ job }})", "refId": "E" }, { "expr": "sum(go_memstats_stack_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Stack - in-use ({{ job }})", "refId": "G" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (service)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "C" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Memory", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "bytes", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": 11 }, "id": 6, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (pod_name), \"service\", - \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "A" }, { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (container_name, pod_name), - \"service\", \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" }, { "expr": "sum(irate(process_cpu_seconds_total{job=~\"istio-telemetry|istio-policy\"}[1m])) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "{{ job }} (self-reported)", "refId": "C" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(process_open_fds{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "hide": true, "instant": false, "interval": "", "intervalFactor": - 2, "legendFormat": "Open FDs ({{ job }})", "refId": "A" }, { "expr": "sum(label_replace(container_fs_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "{{ service }} - {{ container_name - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Disk", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "decimals": null, "format": "none", - "label": "", "logBase": 1024, "max": null, "min": null, "show": false } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 7, "w": 6, "x": 18, "y": 11 }, "id": 4, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": false, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(go_goroutines{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines ({{ - job }})", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Mixer Overview

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 18 }, "height": "40px", "id": 30, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 0, "y": 21 }, "id": 9, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "mixer (Total)", - "refId": "B" }, { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m])) by (grpc_server_method)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "mixer ({{ grpc_server_method - }})", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Incoming Requests", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 6, "x": 6, "y": 21 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [ { - "alias": "{}", "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": - false, "targets": [ { "expr": "histogram_quantile(0.5, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.5", "refId": "B" }, { "expr": "histogram_quantile(0.9, - sum(rate(grpc_io_server_server_latency_bucket{}[1m])) by (grpc_server_method, - le))", "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ grpc_server_method - }} 0.9", "refId": "C" }, { "expr": "histogram_quantile(0.99, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.99", "refId": "D" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Response Durations", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "ms", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 12, "y": 21 }, "id": - 11, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(grpc_server_handled_total{grpc_code=~\"Unknown|Unimplemented|Internal|DataLoss\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Server Error Rate (5xx responses)", "tooltip": { - "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 18, "y": - 21 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(irate(grpc_server_handled_total{grpc_code!=\"OK\",grpc_service=~\".*Mixer\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Non-successes (4xxs)", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "content": - "

Adapters and Config

", "gridPos": { "h": 3, "w": 24, - "x": 0, "y": 27 }, "id": 28, "links": [], "mode": "html", "title": "", "transparent": - true, "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, - "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": - 12, "x": 0, "y": 30 }, "id": 13, "legend": { "avg": false, "current": false, "max": - false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(mixer_runtime_dispatches_total{adapter=~\"$adapter\"}[1m])) by (adapter)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ adapter }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Adapter Dispatch Count", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 30 }, "id": 14, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.5, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p50", "refId": "A" }, { "expr": "histogram_quantile(0.9, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p90 ", "refId": "B" }, { "expr": "histogram_quantile(0.99, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p99", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Adapter Dispatch Duration", "tooltip": { "shared": true, "sort": - 1, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "s", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 37 }, "id": 60, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "scalar(topk(1, max(mixer_config_rule_config_count) by - (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": "Rules", - "refId": "A" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Config Errors", "refId": "B" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_match_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Match Errors", "refId": "C" }, { "expr": "scalar(topk(1, max(mixer_config_unsatisfied_action_handler_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Unsatisfied Actions", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Rules", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 6, "y": 37 }, "id": 56, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_instance_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Instances", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Instances - in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 37 }, "id": 54, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_handler_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Handlers", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Handlers in - Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 18, "y": 37 }, "id": 58, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_attribute_count) by (configID)))", "format": - "time_series", "instant": false, "intervalFactor": 1, "legendFormat": "Attributes", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Attributes in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Individual Adapters

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 44 }, "id": 23, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 47 }, "id": 46, "panels": [], "repeat": - "adapter", "title": "$adapter Adapter", "type": "row" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 12, "x": 0, "y": 48 }, "id": 17, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(irate(mixer_runtime_dispatches_total{adapter=\"$adapter\"}[1m]),\"handler\", - \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ handler }} (error: {{ error }})", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Dispatch - Count By Handler", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 48 }, "id": 18, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(histogram_quantile(0.5, sum(rate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p50 - {{ handler_short - }} (error: {{ error }})", "refId": "A" }, { "expr": "label_replace(histogram_quantile(0.9, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p90 - {{ handler_short - }} (error: {{ error }})", "refId": "D" }, { "expr": "label_replace(histogram_quantile(0.99, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p99 - {{ handler_short - }} (error: {{ error }})", "refId": "E" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Dispatch Duration By Handler", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "s", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": - "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": - [ { "allValue": null, "current": {}, "datasource": "Prometheus", "hide": 0, "includeAll": - true, "label": "Adapter", "multi": true, "name": "adapter", "options": [], "query": - "label_values(adapter)", "refresh": 2, "regex": "", "sort": 1, "tagValuesQuery": - "", "tags": [], "tagsQuery": "", "type": "query", "useTags": false } ] }, "time": - { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", - "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ - "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Mixer Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-mixer-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml deleted file mode 100644 index 32987ba7de..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml +++ /dev/null @@ -1,307 +0,0 @@ -apiVersion: v1 -data: - pilot-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": - "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, "gnetId": - null, "graphTooltip": 1, "id": null, "links": [], "panels": [ { "content": "

Deployed - Versions

", "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": - "40", "id": 58, "links": [], "mode": "html", "title": "", "transparent": true, - "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": - false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": - 0, "y": 3 }, "id": 56, "legend": { "avg": false, "current": false, "max": false, - "min": false, "show": true, "total": false, "values": false }, "lines": true, - "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": - 5, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": - 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build{component=\"pilot\"}) - by (tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ tag - }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Pilot Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Resource Usage

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "process_virtual_memory_bytes{job=\"pilot\"}", "format": - "time_series", "instant": false, "intervalFactor": 2, "legendFormat": "Virtual - Memory", "refId": "I", "step": 2 }, { "expr": "process_resident_memory_bytes{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", - "refId": "H", "step": 2 }, { "expr": "go_memstats_heap_sys_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - sys", "refId": "A" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - alloc", "refId": "D" }, { "expr": "go_memstats_alloc_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F", "step": - 2 }, { "expr": "go_memstats_heap_inuse_bytes{job=\"pilot\"}", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": "E", - "step": 2 }, { "expr": "go_memstats_stack_inuse_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "G", - "step": 2 }, { "expr": "sum(container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"})", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "Total (k8s)", "refId": "C", "step": 2 }, { "expr": "container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B", "step": 2 } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Memory", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "bytes", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": - 11 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m]))", "format": "time_series", "hide": false, - "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": "A", "step": 2 }, - { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m])) by (container_name)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", - "refId": "B", "step": 2 }, { "expr": "irate(process_cpu_seconds_total{job=\"pilot\"}[1m])", - "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "pilot - (self-reported)", "refId": "C", "step": 2 } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"pilot\"}", "format": "time_series", "hide": true, "instant": - false, "interval": "", "intervalFactor": 2, "legendFormat": "Open FDs (pilot)", - "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }}", "refId": "B", "step": 2 } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "bytes", "label": "", "logBase": 1, "max": null, "min": null, "show": - true }, { "decimals": null, "format": "none", "label": "", "logBase": 1024, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 18, "y": - 11 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": false, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines", - "refId": "A", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

xDS

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 18 }, "id": 28, "links": [], "mode": "html", "title": - "", "transparent": true, "type": "text" }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 6, "w": 8, "x": 0, "y": 21 }, "id": 40, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 1, "legendFormat": "XDS GRPC Successes", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Updates", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "round(sum(rate(envoy_cluster_update_attempt{cluster_name=\"xds-grpc\"}[1m])) - - sum(rate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m])))", "format": - "time_series", "intervalFactor": 2, "legendFormat": "XDS GRPC ", "refId": "A", - "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Failures", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 21 }, "id": 41, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(envoy_cluster_upstream_cx_active{cluster_name=\"xds-grpc\"})", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Pilot (XDS GRPC)", "refId": - "C", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Active Connections", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 8, "x": 0, "y": 27 }, "id": 45, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "pilot_conflict_inbound_listener{job=\"pilot\"}", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Inbound Listeners", "refId": "B" }, { "expr": "pilot_conflict_outbound_listener_http_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (http over current tcp)", "refId": "A" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current tcp)", "refId": "C" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_http{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current http)", "refId": "D" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Conflicts", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 8, "y": 27 }, "id": 47, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "pilot_virt_services{job=\"pilot\"}", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Virtual Services", "refId": "A" }, { "expr": - "pilot_services{job=\"pilot\"}", "format": "time_series", "intervalFactor": 1, - "legendFormat": "Services", "refId": "B" }, { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "hide": true, "intervalFactor": 1, "legendFormat": "Rejected CDS Configs - {{ - node }}: {{ err }}", "refId": "C" }, { "expr": "pilot_xds_eds_reject{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 1, "legendFormat": "Rejected - EDS Configs", "refId": "D" }, { "expr": "pilot_xds{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Connected Endpoints", "refId": - "E" }, { "expr": "rate(pilot_xds_write_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Write Timeouts", "refId": - "F" }, { "expr": "rate(pilot_xds_push_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Push Timeouts", "refId": - "G" }, { "expr": "rate(pilot_xds_pushes{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Pushes ({{ type }})", "refId": "H" }, { - "expr": "rate(pilot_xds_push_errors{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Push Errors ({{ type }})", "refId": "I" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "ADS Monitoring", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 16, "y": - 27 }, "id": 49, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{ err }})", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected CDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 0, "y": 35 }, "id": 52, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_eds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected EDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 8, "y": - 35 }, "id": 54, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_lds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected LDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 16, "y": 35 }, "id": 53, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_rds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected RDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": { "outbound|80||default-http-backend.kube-system.svc.cluster.local": - "rgba(255, 255, 255, 0.97)" }, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 0, "y": - 42 }, "id": 51, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [ { "alias": "outbound|80||default-http-backend.kube-system.svc.cluster.local", - "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": - [ { "expr": "sum(pilot_xds_eds_instances{job=\"pilot\"}) by (cluster)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ cluster }}", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "EDS - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Pilot - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-pilot-dashboard - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml deleted file mode 100644 index 6329dad866..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - apiVersion: authentication.istio.io/v1alpha1 - kind: Policy - metadata: - name: grafana-ports-mtls-disabled - namespace: istio-system - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - targets: - - name: grafana - ports: - - number: 3000 - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-custom-resources - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml deleted file mode 100644 index 251c4e2669..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-grafana.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -data: - dashboardproviders.yaml: | - apiVersion: 1 - providers: - - disableDeletion: false - folder: istio - name: istio - options: - path: /var/lib/grafana/dashboards/istio - orgId: 1 - type: file - datasources.yaml: | - apiVersion: 1 - datasources: - - access: proxy - editable: true - isDefault: true - jsonData: - timeInterval: 5s - name: Prometheus - orgId: 1 - type: prometheus - url: http://prometheus:9090 -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 337758a25f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - chart: security - heritage: Tiller - release: istio - spec: - peers: - - mtls: - mode: PERMISSIVE - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index 03832c4720..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: v1 -data: - config: "policy: enabled\ntemplate: |-\n rewriteAppHTTPProbe: false\n initContainers:\n - \ [[ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"NONE\" ]]\n - name: istio-init\n image: \"docker.io/istio/proxy_init:1.1.6\"\n - \ args:\n - \"-p\"\n - [[ .MeshConfig.ProxyListenPort ]]\n - \"-u\"\n - \ - 1337\n - \"-m\"\n - [[ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` - .ProxyConfig.InterceptionMode ]]\n - \"-i\"\n - \"[[ annotation .ObjectMeta - `traffic.sidecar.istio.io/includeOutboundIPRanges` \"*\" ]]\"\n - \"-x\"\n - \ - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` - \ \"\" ]]\"\n - \"-b\"\n - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` - (includeInboundPorts .Spec.Containers) ]]\"\n - \"-d\"\n - \"[[ excludeInboundPort - (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 ) (annotation .ObjectMeta - `traffic.sidecar.istio.io/excludeInboundPorts` \"\" ) ]]\"\n [[ if (isset - .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -]]\n - - \"-k\"\n - \"[[ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` - ]]\"\n [[ end -]]\n imagePullPolicy: IfNotPresent\n resources:\n requests:\n - \ cpu: 10m\n memory: 10Mi\n limits:\n cpu: 100m\n memory: - 50Mi\n securityContext:\n runAsUser: 0\n runAsNonRoot: false\n capabilities:\n - \ add:\n - NET_ADMIN\n restartPolicy: Always\n [[ end -]]\n containers:\n - \ - name: istio-proxy\n image: [[ annotation .ObjectMeta `sidecar.istio.io/proxyImage` - \ \"docker.io/istio/proxyv2:1.1.6\" ]]\n ports:\n - containerPort: 15090\n - \ protocol: TCP\n name: http-envoy-prom\n args:\n - proxy\n - - sidecar\n - --domain\n - $(POD_NAMESPACE).svc.cluster.local\n - --configPath\n - \ - [[ .ProxyConfig.ConfigPath ]]\n - --binaryPath\n - [[ .ProxyConfig.BinaryPath - ]]\n - --serviceCluster\n [[ if ne \"\" (index .ObjectMeta.Labels \"app\") - -]]\n - [[ index .ObjectMeta.Labels \"app\" ]].$(POD_NAMESPACE)\n [[ else - -]]\n - [[ valueOrDefault .DeploymentMeta.Name \"istio-proxy\" ]].[[ valueOrDefault - .DeploymentMeta.Namespace \"default\" ]]\n [[ end -]]\n - --drainDuration\n - \ - [[ formatDuration .ProxyConfig.DrainDuration ]]\n - --parentShutdownDuration\n - \ - [[ formatDuration .ProxyConfig.ParentShutdownDuration ]]\n - --discoveryAddress\n - \ - [[ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress - ]]\n - --zipkinAddress\n - [[ .ProxyConfig.GetTracing.GetZipkin.GetAddress - ]]\n - --connectTimeout\n - [[ formatDuration .ProxyConfig.ConnectTimeout - ]]\n - --proxyAdminPort\n - [[ .ProxyConfig.ProxyAdminPort ]]\n [[ if - gt .ProxyConfig.Concurrency 0 -]]\n - --concurrency\n - [[ .ProxyConfig.Concurrency - ]]\n [[ end -]]\n - --controlPlaneAuthPolicy\n - [[ annotation .ObjectMeta - `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy - ]]\n [[- if (ne (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 - ) \"0\") ]]\n - --statusPort\n - [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n - --applicationPorts\n - \"[[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` - (applicationPorts .Spec.Containers) ]]\"\n [[- end ]]\n env:\n - name: - POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - \ - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: - metadata.namespace\n - name: INSTANCE_IP\n valueFrom:\n fieldRef:\n - \ fieldPath: status.podIP\n \n - name: ISTIO_META_POD_NAME\n valueFrom:\n - \ fieldRef:\n fieldPath: metadata.name\n - name: ISTIO_META_CONFIG_NAMESPACE\n - \ valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - \ - name: ISTIO_META_INTERCEPTION_MODE\n value: [[ or (index .ObjectMeta.Annotations - \"sidecar.istio.io/interceptionMode\") .ProxyConfig.InterceptionMode.String ]]\n - \ [[ if .ObjectMeta.Annotations ]]\n - name: ISTIO_METAJSON_ANNOTATIONS\n - \ value: |\n [[ toJSON .ObjectMeta.Annotations ]]\n [[ end - ]]\n [[ if .ObjectMeta.Labels ]]\n - name: ISTIO_METAJSON_LABELS\n value: - |\n [[ toJSON .ObjectMeta.Labels ]]\n [[ end ]]\n [[- if (isset - .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) ]]\n - name: - ISTIO_BOOTSTRAP_OVERRIDE\n value: \"/etc/istio/custom-bootstrap/custom_bootstrap.json\"\n - \ [[- end ]]\n imagePullPolicy: IfNotPresent\n [[ if (ne (annotation .ObjectMeta - `status.sidecar.istio.io/port` 15020 ) \"0\") ]]\n readinessProbe:\n httpGet:\n - \ path: /healthz/ready\n port: [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n initialDelaySeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` - \ 1 ]]\n periodSeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` - \ 2 ]]\n failureThreshold: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` - \ 30 ]]\n [[ end -]]securityContext:\n readOnlyRootFilesystem: true\n - \ [[ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"TPROXY\" -]]\n capabilities:\n add:\n - NET_ADMIN\n runAsGroup: - 1337\n [[ else -]]\n \n runAsUser: 1337\n [[- end ]]\n resources:\n - \ [[ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset - .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -]]\n requests:\n - \ [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -]]\n - \ cpu: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` ]]\"\n - \ [[ end ]]\n [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) - -]]\n memory: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` - ]]\"\n [[ end ]]\n [[ else -]]\n limits:\n cpu: 2000m\n - \ memory: 128Mi\n requests:\n cpu: 10m\n memory: 40Mi\n - \ \n [[ end -]]\n volumeMounts:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - mountPath: /etc/istio/custom-bootstrap\n - \ name: custom-bootstrap-volume\n [[- end ]]\n - mountPath: /etc/istio/proxy\n - \ name: istio-envoy\n - mountPath: /etc/certs/\n name: istio-certs\n - \ readOnly: true\n [[- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` - ]]\n [[ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 4 ]]\n [[ - end ]]\n [[- end ]]\n volumes:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - name: custom-bootstrap-volume\n - \ configMap:\n name: [[ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` - `` ]]\n [[- end ]]\n - emptyDir:\n medium: Memory\n name: istio-envoy\n - \ - name: istio-certs\n secret:\n optional: true\n [[ if eq .Spec.ServiceAccountName - \"\" -]]\n secretName: istio.default\n [[ else -]]\n secretName: - [[ printf \"istio.%s\" .Spec.ServiceAccountName ]]\n [[ end -]]\n [[- - if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` ]]\n [[ range - $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 2 ]]\n [[ end - ]]\n [[ end ]]" -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index be0ffff1af..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - mesh: "# Set the following variable to true to disable policy checks by the Mixer.\n# - Note that metrics will still be reported to the Mixer.\ndisablePolicyChecks: false\n\n# - Set enableTracing to false to disable request tracing.\nenableTracing: true\n\n# - Set accessLogFile to empty string to disable access log.\naccessLogFile: \"/dev/stdout\"\n\n# - If accessLogEncoding is TEXT, value will be used directly as the log format\n# - example: \"[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\\n\"\n# - If AccessLogEncoding is JSON, value will be parsed as map[string]string\n# example: - '{\"start_time\": \"%START_TIME%\", \"req_method\": \"%REQ(:METHOD)%\"}'\n# Leave - empty to use default log format\naccessLogFormat: \"\"\n\n# Set accessLogEncoding - to JSON or TEXT to configure sidecar access log\naccessLogEncoding: 'TEXT'\nmixerCheckServer: - istio-policy.istio-system.svc.cluster.local:9091\nmixerReportServer: istio-telemetry.istio-system.svc.cluster.local:9091\n# - policyCheckFailOpen allows traffic in cases when the mixer policy service cannot - be reached.\n# Default is false which means the traffic is denied when the client - is unable to connect to Mixer.\npolicyCheckFailOpen: false\n# Let Pilot give ingresses - the public IP of the Istio ingressgateway\ningressService: istio-ingressgateway\n\n# - Default connect timeout for dynamic clusters generated by Pilot and returned via - XDS\nconnectTimeout: 10s\n\n# DNS refresh rate for Envoy clusters of type STRICT_DNS\ndnsRefreshRate: - 5s\n\n# Unix Domain Socket through which envoy communicates with NodeAgent SDS - to get\n# key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - \nsdsUdsPath: \n\n# This flag is used by secret discovery service(SDS). \n# If - set to true(prerequisite: https://kubernetes.io/docs/concepts/storage/volumes/#projected), - Istio will inject volumes mount \n# for k8s service account JWT, so that K8s API - server mounts k8s service account JWT to envoy container, which \n# will be used - to generate key/cert eventually. This isn't supported for non-k8s case.\nenableSdsTokenMount: - false\n\n# This flag is used by secret discovery service(SDS). \n# If set to true, - envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token' - \n# (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod) - \n# and pass to sds server, which will be used to request key/cert eventually. - \n# this flag is ignored if enableSdsTokenMount is set.\n# This isn't supported - for non-k8s case.\nsdsUseK8sSaJwt: false\n\n# The trust domain corresponds to - the trust root of a system.\n# Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain\ntrustDomain: - \n\n# Set the default behavior of the sidecar for handling outbound traffic from - the application:\n# ALLOW_ANY - outbound traffic to unknown destinations will - be allowed, in case there are no\n# services or ServiceEntries for the destination - port\n# REGISTRY_ONLY - restrict outbound traffic to services defined in the service - registry as well\n# as those defined through ServiceEntries \noutboundTrafficPolicy:\n - \ mode: ALLOW_ANY\n\nlocalityLbSetting:\n {}\n \n\n# The namespace to treat - as the administrative root namespace for istio\n# configuration. \nrootNamespace: - istio-system\nconfigSources:\n- address: istio-galley.istio-system.svc:9901\n\ndefaultConfig:\n - \ #\n # TCP connection timeout between Envoy & the application, and between Envoys. - \ Used for static clusters\n # defined in Envoy's configuration file\n connectTimeout: - 10s\n #\n ### ADVANCED SETTINGS #############\n # Where should envoy's configuration - be stored in the istio-proxy container\n configPath: \"/etc/istio/proxy\"\n binaryPath: - \"/usr/local/bin/envoy\"\n # The pseudo service name used for Envoy.\n serviceCluster: - istio-proxy\n # These settings that determine how long an old Envoy\n # process - should be kept alive after an occasional reload.\n drainDuration: 45s\n parentShutdownDuration: - 1m0s\n #\n # The mode used to redirect inbound connections to Envoy. This setting\n - \ # has no effect on outbound traffic: iptables REDIRECT is always used for\n - \ # outbound connections.\n # If \"REDIRECT\", use iptables REDIRECT to NAT and - redirect to Envoy.\n # The \"REDIRECT\" mode loses source addresses during redirection.\n - \ # If \"TPROXY\", use iptables TPROXY to redirect to Envoy.\n # The \"TPROXY\" - mode preserves both the source and destination IP\n # addresses and ports, so - that they can be used for advanced filtering\n # and manipulation.\n # The \"TPROXY\" - mode also configures the sidecar to run with the\n # CAP_NET_ADMIN capability, - which is required to use TPROXY.\n #interceptionMode: REDIRECT\n #\n # Port - where Envoy listens (on local host) for admin commands\n # You can exec into - the istio-proxy container in a pod and\n # curl the admin port (curl http://localhost:15000/) - to obtain\n # diagnostic information from Envoy. See\n # https://lyft.github.io/envoy/docs/operations/admin.html\n - \ # for more details\n proxyAdminPort: 15000\n #\n # Set concurrency to a specific - number to control the number of Proxy worker threads.\n # If set to 0 (default), - then start worker thread for each CPU thread/core.\n concurrency: 2\n #\n tracing:\n - \ zipkin:\n # Address of the Zipkin collector\n address: zipkin.istio-system:9411\n - \ #\n # Mutual TLS authentication between sidecars and istio control plane.\n - \ controlPlaneAuthPolicy: NONE\n #\n # Address where istio Pilot service is - running\n discoveryAddress: istio-pilot.istio-system:15010" - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - release: istio - name: istio - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml deleted file mode 100644 index ec52e4be53..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "istio_namespace: istio-system\nserver:\n port: 20001\nexternal_services:\n - \ istio:\n url_service_version: http://istio-pilot:8080/version\n jaeger:\n - \ url: \n grafana:\n url: \n" -kind: ConfigMap -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index 1a06e2ff6c..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,313 +0,0 @@ -apiVersion: v1 -data: - prometheus.yml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - metric_relabel_configs: - # Exclude some of the envoy metrics that have massive cardinality - # This list may need to be pruned further moving forward, as informed - # by performance and scalability testing. - - source_labels: [ cluster_name ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ tcp_prefix ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ listener_address ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_listener_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tls.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tcp_downstream.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_http_(stats|admin).*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_cluster_(lb|retry|bind|internal|max|original).*' - action: drop - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 072bd0fd7a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - istio-injection: disabled - name: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml deleted file mode 100644 index c96321c013..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_secret_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - passphrase: YWRtaW4= - username: YWRtaW4= -kind: Secret -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -type: Opaque diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml deleted file mode 100644 index ddc7dbff72..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_grafana.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - ports: - - name: http - port: 3000 - protocol: TCP - targetPort: 3000 - selector: - app: grafana - type: ClusterIP diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 4215ecb031..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml deleted file mode 100644 index 4998a7f877..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-egressgateway.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - - name: https - port: 443 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-egressgateway - istio: egressgateway - release: istio - type: ClusterIP diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index e037f828d3..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index 5833ac81fa..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - release: istio - type: NodePort diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 20b0a6b506..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 31ff71c40b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 877561ec4a..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - port: 443 - selector: - istio: sidecar-injector diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index eebbbe6978..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml deleted file mode 100644 index 1dfd5cd653..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-agent.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: agent-service - release: istio - name: jaeger-agent - namespace: istio-system -spec: - clusterIP: None - ports: - - name: agent-zipkin-thrift - port: 5775 - protocol: UDP - targetPort: 5775 - - name: agent-compact - port: 6831 - protocol: UDP - targetPort: 6831 - - name: agent-binary - port: 6832 - protocol: UDP - targetPort: 6832 - selector: - app: jaeger diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml deleted file mode 100644 index 5f4aeccfb5..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-collector.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: collector-service - release: istio - name: jaeger-collector - namespace: istio-system -spec: - ports: - - name: jaeger-collector-tchannel - port: 14267 - protocol: TCP - targetPort: 14267 - - name: jaeger-collector-http - port: 14268 - protocol: TCP - targetPort: 14268 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml deleted file mode 100644 index 94a9e9d15b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_jaeger-query.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: jaeger-service - release: istio - name: jaeger-query - namespace: istio-system -spec: - ports: - - name: query-http - port: 16686 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml deleted file mode 100644 index 049f4c74d7..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_kiali.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - ports: - - name: http-kiali - port: 20001 - protocol: TCP - selector: - app: kiali diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index f0ecb03d63..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml deleted file mode 100644 index 973e98032f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_tracing.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: null - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: tracing - namespace: istio-system -spec: - ports: - - name: http-query - port: 80 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml deleted file mode 100644 index 43acf02148..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_service_zipkin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: zipkin - namespace: istio-system -spec: - ports: - - name: http - port: 9411 - protocol: TCP - targetPort: 9411 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index 8cf250f0d0..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml deleted file mode 100644 index ab525f7ced..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml deleted file mode 100644 index 5581b918c1..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index adb8c1a617..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml deleted file mode 100644 index 94a0b1f0ac..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index ad9a81526f..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index c0c452e957..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index e6b9404cda..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index c844263f93..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index e40f71183b..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml deleted file mode 100644 index 6a40ec8143..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-service-account - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 2ad4d98808..0000000000 --- a/tests/stacks/openshift/application/istio-stack/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/stacks/openshift/application/istio/kustomize_test.go b/tests/stacks/openshift/application/istio/kustomize_test.go deleted file mode 100644 index c1f289e114..0000000000 --- a/tests/stacks/openshift/application/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/stacks/openshift/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 9c7e471ebc..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "OFF" diff --git a/tests/stacks/openshift/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml b/tests/stacks/openshift/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml deleted file mode 100644 index ccc61b697b..0000000000 --- a/tests/stacks/openshift/application/istio/test_data/expected/~g_v1_configmap_istio-parameters-t6hhgfg9k2.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "OFF" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-parameters-t6hhgfg9k2 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/jupyter-web-app/kustomize_test.go b/tests/stacks/openshift/application/jupyter-web-app/kustomize_test.go deleted file mode 100644 index ff4e584aab..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package jupyter_web_app - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/jupyter-web-app", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 0650a53f8f..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 3db134c804..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - image: quay.io/kubeflow/jupyter-web-app:v2.0.0 - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config-c7ckdh44mc - name: config-volume diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml deleted file mode 100644 index 1aaf497f8a..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app-jupyter-web-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index e15e8b6e22..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index 0ae2ffa5c6..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index 9cff1100a0..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 265ceff545..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 925b70ec6f..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 0c57d76f07..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index e07f869911..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-c7ckdh44mc.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-c7ckdh44mc.yaml deleted file mode 100644 index 40dd5cfd38..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config-c7ckdh44mc.yaml +++ /dev/null @@ -1,136 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: | - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: quay.io/kubeflow/tf-notebook-image:v0.7.0 - # The list of available standard container Images - options: - - quay.io/kubeflow/tf-notebook-image:v0.7.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false -kind: ConfigMap -metadata: - annotations: {} - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config-c7ckdh44mc - namespace: kubeflow diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index cbc5e87e29..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /$(prefix)/ - service: jupyter-web-app-service.$(namespace) - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index 926d7e9b7a..0000000000 --- a/tests/stacks/openshift/application/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/kustomize_test.go b/tests/stacks/openshift/application/katib/kustomize_test.go deleted file mode 100644 index b1a7aacca4..0000000000 --- a/tests/stacks/openshift/application/katib/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/katib", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index d5c52ecf04..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 22efe19141..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 4ab50ef082..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 173425f3a9..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index ff75fa592b..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-crds - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 8623abd1c1..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - - --webhook-inject-securitycontext=true - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 16949634b7..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index 914b2a5e78..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - spec: - containers: - - env: - - name: MYSQL_USER - valueFrom: - secretKeyRef: - key: MYSQL_USER - name: katib-mysql-secrets - - name: MYSQL_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_LOWER_CASE_TABLE_NAMES - value: "1" - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: registry.redhat.io/rhscl/mysql-80-rhel7:latest - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -uroot - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -uroot -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql/data - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index 4b9d958995..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/stacks/openshift/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index 6bb614b82b..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 0536e926a8..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,92 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 66faccefb1..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 45d4cb1843..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 11ad89cab6..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 95b524a46e..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index 908f9dad49..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index e9f5ce2506..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index f5881bfb7c..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-config - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 260ea24d70..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: trial-template - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index f07c332452..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index debbabb435..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index ee4d8bfe18..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MYSQL_PASSWORD: dGVzdC9wYXNzd29yZA== - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 59c34c7868..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index ff2e1df9ab..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: db-manager - type: ClusterIP diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index 5b3c87b53e..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: mysql - type: ClusterIP diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 399b6e1644..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - component: ui - type: ClusterIP diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index bfbc7b770e..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-controller - namespace: kubeflow diff --git a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index 16c2b45417..0000000000 --- a/tests/stacks/openshift/application/katib/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/name: katib-controller - name: katib-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/kustomize_test.go b/tests/stacks/openshift/application/kfp-tekton/kustomize_test.go deleted file mode 100644 index fda94e9709..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfp_tekton - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/kfp-tekton", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 786c0ae404..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/aipipeline/metadata-writer:0.4.0 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 93df16584c..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index f37eaea8a5..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: docker.io/aipipeline/persistenceagent:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 228b995fd5..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/aipipeline/scheduledworkflow:0.4.0 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index dd5d721ed2..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: docker.io/aipipeline/frontend:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index a60cac492e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,148 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: ARTIFACT_BUCKET - valueFrom: - configMapKeyRef: - key: artifact_bucket - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT - valueFrom: - configMapKeyRef: - key: artifact_endpoint - name: kfp-tekton-config - - name: ARTIFACT_ENDPOINT_SCHEME - valueFrom: - configMapKeyRef: - key: artifact_endpoint_scheme - name: kfp-tekton-config - - name: ARCHIVE_LOGS - valueFrom: - configMapKeyRef: - key: archive_logs - name: kfp-tekton-config - - name: TRACK_ARTIFACTS - valueFrom: - configMapKeyRef: - key: track_artifacts - name: kfp-tekton-config - - name: STRIP_EOF - valueFrom: - configMapKeyRef: - key: strip_eof - name: kfp-tekton-config - - name: ARTIFACT_SCRIPT - valueFrom: - configMapKeyRef: - key: artifact_script - name: kfp-tekton-config - - name: ARTIFACT_IMAGE - valueFrom: - configMapKeyRef: - key: artifact_image - name: kfp-tekton-config - - name: INJECT_DEFAULT_SCRIPT - valueFrom: - configMapKeyRef: - key: inject_default_script - name: kfp-tekton-config - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: docker.io/aipipeline/api-server:0.4.0 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index 8ec616b644..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index dad84d711b..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 51363258a5..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index 70f0efca82..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index c886c87d76..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index f049311840..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index 0023a8baa7..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - - conditions - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml deleted file mode 100644 index 932a873101..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/tekton.dev_v1alpha1_condition_super-condition.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: tekton.dev/v1alpha1 -kind: Condition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: super-condition - namespace: kubeflow -spec: - check: - image: python:alpine3.6 - script: |- - python -c 'import sys - input1=str.rstrip(sys.argv[1]) - input2=str.rstrip(sys.argv[2]) - try: - input1=int(input1) - input2=int(input2) - except: - input1=str(input1) - sys.exit(0) if (input1 $(params.operator) input2) else sys.exit(1)' '$(params.operand1)' '$(params.operand2)' - params: - - name: operand1 - - name: operand2 - - name: operator diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml deleted file mode 100644 index 0e53393a62..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kfp-tekton-config.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -data: - archive_logs: "false" - artifact_bucket: mlpipeline - artifact_endpoint: minio-service.kubeflow:9000 - artifact_endpoint_scheme: http:// - artifact_image: minio/mc:RELEASE.2020-11-25T23-04-07Z - artifact_script: |- - #!/usr/bin/env sh - push_artifact() { - tar -cvzf $1.tgz $2 - mc cp $1.tgz storage/$ARTIFACT_BUCKET/artifacts/$PIPELINERUN/$PIPELINETASK/$1.tgz - } - push_log() { - cat /var/log/containers/$PODNAME*$NAMESPACE*step-main*.log > step-main.log - push_artifact main-log step-main.log - } - strip_eof() { - awk 'NF' $2 | head -c -1 > $1_temp_save && cp $1_temp_save $2 - } - mc config host add storage ${ARTIFACT_ENDPOINT_SCHEME}${ARTIFACT_ENDPOINT} $AWS_ACCESS_KEY_ID $AWS_SECRET_ACCESS_KEY - inject_default_script: "true" - strip_eof: "false" - track_artifacts: "true" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kfp-tekton-config - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 2820e03a28..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index 9e7ca8b1a1..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 8c182135e1..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index 3ab48a4f5f..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index d9eaa27473..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/openshift/application/kfp-tekton/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/openshift/application/metadata/kustomize_test.go b/tests/stacks/openshift/application/metadata/kustomize_test.go deleted file mode 100644 index 047d8fd902..0000000000 --- a/tests/stacks/openshift/application/metadata/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package metadata - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/metadata", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index 6af9bf661e..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -u$$MYSQL_USER_NAME -p$$MYSQL_ROOT_PASSWORD - -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - serviceAccountName: metadatadb - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index 66929f9f1d..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 5f53346cb8..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index cc9741b27e..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml deleted file mode 100644 index 3aa74d8ac5..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-db-parameters.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ALLOW_EMPTY_PASSWORD: "true" - MYSQL_DATABASE: metadb - MYSQL_PORT: "3306" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-db-parameters - namespace: kubeflow diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index b8605cd7b7..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index d6a0de88e5..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - labels: - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index d08a7d2475..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml deleted file mode 100644 index 918b7d1198..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_secret_metadata-db-secrets.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== - MYSQL_USER_NAME: cm9vdA== -kind: Secret -metadata: - labels: - kustomize.component: metadata - name: metadata-db-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index eb77733c55..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index 88f6246f90..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index a7f38d715b..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_serviceaccount_metadatadb.yaml b/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_serviceaccount_metadatadb.yaml deleted file mode 100644 index dba08a8f2e..0000000000 --- a/tests/stacks/openshift/application/metadata/test_data/expected/~g_v1_serviceaccount_metadatadb.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - component: db - name: metadatadb - namespace: kubeflow diff --git a/tests/stacks/openshift/application/notebook-controller/kustomize_test.go b/tests/stacks/openshift/application/notebook-controller/kustomize_test.go deleted file mode 100644 index 283ebbeceb..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package notebook_controller - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/notebook-controller", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index 568d48ef57..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml deleted file mode 100644 index 848ff66a6b..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller-notebook-controller.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 89f881d5ed..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: ADD_FSGROUP - value: "false" - - name: USE_ISTIO - valueFrom: - configMapKeyRef: - key: USE_ISTIO - name: notebook-controller-notebook-controller-config-h4d668t5tb - - name: ISTIO_GATEWAY - valueFrom: - configMapKeyRef: - key: ISTIO_GATEWAY - name: notebook-controller-notebook-controller-config-h4d668t5tb - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 888f8051a7..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index b0bdfef7c7..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 96d3c06016..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 9dc48eb0f2..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 48147bb7bd..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml deleted file mode 100644 index e791bbd2b3..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-notebook-controller-config-h4d668t5tb.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - USE_ISTIO: "true" -kind: ConfigMap -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-notebook-controller-config-h4d668t5tb - namespace: kubeflow diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 526932f170..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - kustomize.component: notebook-controller diff --git a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 3493a1e5d0..0000000000 --- a/tests/stacks/openshift/application/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/kustomize_test.go b/tests/stacks/openshift/application/openshift/openshift-scc/kustomize_test.go deleted file mode 100644 index 3eec08908d..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package openshift_scc - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../../stacks/openshift/application/openshift/openshift-scc", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-istio.yaml b/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-istio.yaml deleted file mode 100644 index bc0a514483..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-istio.yaml +++ /dev/null @@ -1,51 +0,0 @@ -allowHostDirVolumePlugin: true -allowHostIPC: false -allowHostNetwork: false -allowHostPID: false -allowHostPorts: false -allowPrivilegeEscalation: true -allowPrivilegedContainer: false -allowedCapabilities: null -apiVersion: security.openshift.io/v1 -defaultAddCapabilities: null -fsGroup: - type: RunAsAny -groups: -- system:cluster-admins -kind: SecurityContextConstraints -metadata: - annotations: - kubernetes.io/description: kubeflow-anyuid provides all features of the restricted - SCC but allows users to run with any UID and any GID. - name: kubeflow-anyuid-istio - namespace: kubeflow -priority: 10 -readOnlyRootFilesystem: false -requiredDropCapabilities: -- MKNOD -runAsUser: - type: RunAsAny -seLinuxContext: - type: MustRunAs -supplementalGroups: - type: RunAsAny -users: -- system:serviceaccount:istio-system:istio-egressgateway-service-account -- system:serviceaccount:istio-system:istio-citadel-service-account -- system:serviceaccount:istio-system:istio-cleanup-old-ca-service-account -- system:serviceaccount:istio-system:istio-mixer-post-install-account -- system:serviceaccount:istio-system:istio-mixer-service-account -- system:serviceaccount:istio-system:istio-sidecar-injector-service-account -- system:serviceaccount:istio-system:istio-sidecar-injector-service-account -- system:serviceaccount:istio-system:istio-galley-service-account -- system:serviceaccount:istio-system:prometheus -- system:serviceaccount:istio-system:cluster-local-gateway-service-account -- system:serviceaccount:istio-system:oidc-authservice-service-account -volumes: -- configMap -- downwardAPI -- emptyDir -- persistentVolumeClaim -- projected -- secret -- hostPath diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-kubeflow.yaml b/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-kubeflow.yaml deleted file mode 100644 index df55026ddc..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-anyuid-kubeflow.yaml +++ /dev/null @@ -1,44 +0,0 @@ -allowHostDirVolumePlugin: false -allowHostIPC: false -allowHostNetwork: false -allowHostPID: false -allowHostPorts: false -allowPrivilegeEscalation: true -allowPrivilegedContainer: false -allowedCapabilities: null -apiVersion: security.openshift.io/v1 -defaultAddCapabilities: null -fsGroup: - type: RunAsAny -groups: -- system:cluster-admins -kind: SecurityContextConstraints -metadata: - annotations: - kubernetes.io/description: kubeflow-anyuid provides all features of the restricted - SCC but allows users to run with any UID and any GID. - name: kubeflow-anyuid-kubeflow - namespace: kubeflow -priority: 10 -readOnlyRootFilesystem: false -requiredDropCapabilities: -- MKNOD -runAsUser: - type: RunAsAny -seLinuxContext: - type: MustRunAs -supplementalGroups: - type: RunAsAny -users: -- system:serviceaccount:kubeflow:metadatadb -- system:serviceaccount:kubeflow:minio -- system:serviceaccount:kubeflow:kubeflow-pipelines-cache-deployer-sa -- system:serviceaccount:kubeflow:kfserving -- system:serviceaccount:kubeflow:admission-webhook-service-account -volumes: -- configMap -- downwardAPI -- emptyDir -- persistentVolumeClaim -- projected -- secret diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-privileged-istio.yaml b/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-privileged-istio.yaml deleted file mode 100644 index 6e0953c905..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_kubeflow-privileged-istio.yaml +++ /dev/null @@ -1,43 +0,0 @@ -allowHostDirVolumePlugin: true -allowHostIPC: false -allowHostNetwork: false -allowHostPID: false -allowHostPorts: false -allowPrivilegeEscalation: true -allowPrivilegedContainer: true -allowedCapabilities: null -apiVersion: security.openshift.io/v1 -defaultAddCapabilities: null -fsGroup: - type: RunAsAny -groups: -- system:cluster-admins -kind: SecurityContextConstraints -metadata: - annotations: - kubernetes.io/description: kubeflow-anyuid provides all features of the restricted - SCC but allows users to run with any UID and any GID. - name: kubeflow-privileged-istio - namespace: kubeflow -priority: 10 -readOnlyRootFilesystem: false -requiredDropCapabilities: -- MKNOD -runAsUser: - type: RunAsAny -seLinuxContext: - type: MustRunAs -supplementalGroups: - type: RunAsAny -users: -- system:serviceaccount:istio-system:istio-ingressgateway-service-account -- system:serviceaccount:istio-system:istio-pilot-service-account -- system:serviceaccount:istio-system:istio-mixer-service-account -volumes: -- configMap -- downwardAPI -- emptyDir -- persistentVolumeClaim -- projected -- secret -- hostPath diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_tekton-anyuid-kubeflow.yaml b/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_tekton-anyuid-kubeflow.yaml deleted file mode 100644 index 99832d429e..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/security.openshift.io_v1_securitycontextconstraints_tekton-anyuid-kubeflow.yaml +++ /dev/null @@ -1,40 +0,0 @@ -allowHostDirVolumePlugin: false -allowHostIPC: false -allowHostNetwork: false -allowHostPID: false -allowHostPorts: false -allowPrivilegeEscalation: true -allowPrivilegedContainer: false -allowedCapabilities: null -apiVersion: security.openshift.io/v1 -defaultAddCapabilities: null -fsGroup: - type: RunAsAny -groups: -- system:cluster-admins -kind: SecurityContextConstraints -metadata: - annotations: - kubernetes.io/description: tekton-anyuid provides all features of the restricted - SCC but allows users to run with any UID and any GID. - name: tekton-anyuid-kubeflow - namespace: kubeflow -priority: 10 -readOnlyRootFilesystem: false -requiredDropCapabilities: -- MKNOD -runAsUser: - type: RunAsAny -seLinuxContext: - type: MustRunAs -supplementalGroups: - type: RunAsAny -users: -- system:serviceaccount:tekton-pipelines:tekton-pipelines-controller -volumes: -- configMap -- downwardAPI -- emptyDir -- persistentVolumeClaim -- projected -- secret diff --git a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/~g_v1_configmap_scc-namespace-check.yaml b/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/~g_v1_configmap_scc-namespace-check.yaml deleted file mode 100644 index bd496a536f..0000000000 --- a/tests/stacks/openshift/application/openshift/openshift-scc/test_data/expected/~g_v1_configmap_scc-namespace-check.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -data: - namespace: kubeflow - tekton-namespace: tekton-pipelines -kind: ConfigMap -metadata: - name: scc-namespace-check - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/kustomize_test.go b/tests/stacks/openshift/application/pipeline/kustomize_test.go deleted file mode 100644 index 2f395f6afc..0000000000 --- a/tests/stacks/openshift/application/pipeline/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pipeline - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/pipeline", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 39c462bb2e..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index 711e1a0029..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml deleted file mode 100644 index f0e36a4d69..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_kubeflow-pipelines.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - annotations: - kubernetes-engine.cloud.google.com/icon: data:image/png;base64,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 - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: v1 - kind: ServiceAccount - - group: rbac.authorization.k8s.io/v1 - kind: Role - - group: rbac.authorization.k8s.io/v1 - kind: RoleBinding - - group: v1 - kind: Service - - group: v1 - kind: PersistentVolumeClaim - - group: v1 - kind: ConfigMap - - group: v1 - kind: Secret - - group: apps/v1 - kind: Deployment - - group: networking.istio.io/v1alpha3 - kind: VirtualService - descriptor: - description: Reusable end-to-end ML workflow - links: - - description: Kubeflow Pipelines Documentation - url: https://www.kubeflow.org/docs/pipelines/ - maintainers: - - name: Kubeflow Pipelines - url: https://github.com/kubeflow/pipelines - type: Kubeflow Pipelines - version: 1.0.4 - selector: - matchLabels: - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml deleted file mode 100644 index e1b386dfb9..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_minio.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - minio - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: minio - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml deleted file mode 100644 index d4db458295..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/app.k8s.io_v1beta1_application_mysql.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - mysql - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: mysql - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml deleted file mode 100644 index e8a95f1f1a..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-deployer-deployment.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-deployer-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - strategy: - type: Recreate - template: - metadata: - labels: - app: cache-deployer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-deployer:1.0.4 - imagePullPolicy: Always - name: main - restartPolicy: Always - serviceAccountName: kubeflow-pipelines-cache-deployer-sa diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-server.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-server.yaml deleted file mode 100644 index a5373e3d14..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_cache-server.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - args: - - --db_driver=$(DBCONFIG_DRIVER) - - --db_host=$(DBCONFIG_HOST_NAME) - - --db_port=$(DBCONFIG_PORT) - - --db_name=$(DBCONFIG_DB_NAME) - - --db_user=$(DBCONFIG_USER) - - --db_password=$(DBCONFIG_PASSWORD) - - --namespace_to_watch=$(NAMESPACE_TO_WATCH) - env: - - name: DBCONFIG_DRIVER - value: mysql - - name: DBCONFIG_DB_NAME - valueFrom: - configMapKeyRef: - key: cacheDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST_NAME - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/cache-server:1.0.4 - imagePullPolicy: Always - name: server - ports: - - containerPort: 8443 - name: webhook-api - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-tls-certs - readOnly: true - serviceAccountName: kubeflow-pipelines-cache - volumes: - - name: webhook-tls-certs - secret: - secretName: webhook-server-tls diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_metadata-writer.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_metadata-writer.yaml deleted file mode 100644 index 77004306de..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_metadata-writer.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: metadata-writer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: metadata-writer - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE_TO_WATCH - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/metadata-writer:1.0.4 - name: main - serviceAccountName: kubeflow-pipelines-metadata-writer diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_minio.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_minio.yaml deleted file mode 100644 index 31a7a91930..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_minio.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio - namespace: kubeflow -spec: - selector: - matchLabels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - spec: - containers: - - args: - - server - - /data - env: - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/minio:RELEASE.2019-08-14T20-37-41Z-license-compliance - name: minio - ports: - - containerPort: 9000 - volumeMounts: - - mountPath: /data - name: data - subPath: minio - volumes: - - name: data - persistentVolumeClaim: - claimName: minio-pvc diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 3d8cd5347c..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: TTL_SECONDS_AFTER_WORKFLOW_FINISH - value: "86400" - image: gcr.io/ml-pipeline/persistenceagent:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d395adaed4..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:1.0.4 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 1a60f06ce5..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MINIO_ACCESS_KEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: MINIO_SECRET_KEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-ui - ports: - - containerPort: 3000 - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:3000/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - volumeMounts: - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml deleted file mode 100644 index c2874009d9..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-crd.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: MAX_NUM_VIEWERS - value: "50" - - name: MINIO_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:1.0.4 - imagePullPolicy: Always - name: ml-pipeline-viewer-crd - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index bf0ef4fb76..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 - name: http - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/ - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline-visualizationserver diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 1fb43d9089..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,103 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - template: - metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: OBJECTSTORECONFIG_SECURE - value: "false" - - name: OBJECTSTORECONFIG_BUCKETNAME - valueFrom: - configMapKeyRef: - key: bucketName - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_USER - valueFrom: - secretKeyRef: - key: username - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_PASSWORD - valueFrom: - secretKeyRef: - key: password - name: mysql-secret-fd5gktm75t - - name: DBCONFIG_DBNAME - valueFrom: - configMapKeyRef: - key: pipelineDb - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_HOST - valueFrom: - configMapKeyRef: - key: dbHost - name: pipeline-install-config-2829cc67f8 - - name: DBCONFIG_PORT - valueFrom: - configMapKeyRef: - key: dbPort - name: pipeline-install-config-2829cc67f8 - - name: OBJECTSTORECONFIG_ACCESSKEY - valueFrom: - secretKeyRef: - key: accesskey - name: mlpipeline-minio-artifact - - name: OBJECTSTORECONFIG_SECRETACCESSKEY - valueFrom: - secretKeyRef: - key: secretkey - name: mlpipeline-minio-artifact - image: gcr.io/ml-pipeline/api-server:1.0.4 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - name: http - - containerPort: 8887 - name: grpc - readinessProbe: - exec: - command: - - wget - - -q - - -S - - -O - - '-' - - http://localhost:8888/apis/v1beta1/healthz - initialDelaySeconds: 3 - periodSeconds: 5 - timeoutSeconds: 2 - serviceAccountName: ml-pipeline diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_mysql.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_mysql.yaml deleted file mode 100644 index b47bdbb60a..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/apps_v1_deployment_mysql.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - selector: - matchLabels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - strategy: - type: Recreate - template: - metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - spec: - containers: - - env: - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - image: gcr.io/ml-pipeline/mysql:5.6 - name: mysql - ports: - - containerPort: 3306 - name: mysql - volumeMounts: - - mountPath: /var/lib/mysql - name: mysql-persistent-storage - volumes: - - name: mysql-persistent-storage - persistentVolumeClaim: - claimName: mysql-pv-claim diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index f626864576..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml deleted file mode 100644 index 5ba54f3cda..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pipelines-cache-deployer-clusterrole.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-clusterrole - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrole -rules: -- apiGroups: - - certificates.k8s.io - resources: - - certificatesigningrequests - - certificatesigningrequests/approval - verbs: - - create - - delete - - get - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - delete - - get - - list - - patch -- apiGroups: - - certificates.k8s.io - resourceNames: - - kubernetes.io/* - resources: - - signers - verbs: - - approve diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml deleted file mode 100644 index 459313eff8..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kubeflow-pipelines-cache-deployer-clusterrolebinding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-clusterrolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kubeflow-pipelines-cache-deployer-clusterrole -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml deleted file mode 100644 index 59924196e1..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-deployer-role.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-deployer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - delete - - get - - patch - - list diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml deleted file mode 100644 index 7c2b27e343..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-cache-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-cache-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml deleted file mode 100644 index c300b1cda8..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_kubeflow-pipelines-metadata-writer-role.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: kubeflow-pipelines-metadata-writer-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml deleted file mode 100644 index 8d376c6ae5..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-persistenceagent-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml deleted file mode 100644 index a31ac1ebfd..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-scheduledworkflow-role.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow-role - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-role - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 4ff55fe4e7..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index 522897510e..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-controller-role - namespace: kubeflow -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml deleted file mode 100644 index 5a947370a6..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_ml-pipeline.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml deleted file mode 100644 index fdd503498a..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_role_pipeline-runner.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml deleted file mode 100644 index e76122f19f..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml deleted file mode 100644 index 7471959ec9..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-cache-deployer-rolebinding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-cache-deployer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml deleted file mode 100644 index 32755c9be3..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_kubeflow-pipelines-metadata-writer-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: kubeflow-pipelines-metadata-writer-role -subjects: -- kind: ServiceAccount - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml deleted file mode 100644 index c1033e02db..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-persistenceagent-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-persistenceagent-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml deleted file mode 100644 index c3ed87368c..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-scheduledworkflow-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-scheduledworkflow-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 1d78022b2b..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml deleted file mode 100644 index 96503d4ab4..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline-viewer-crd-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index ff6a5433d3..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml deleted file mode 100644 index 9e1352d61a..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_pipeline-runner-binding.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml deleted file mode 100644 index 461638d1f8..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_ml-pipeline-ui-configmap.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - viewer-pod-template.json: |- - { - "spec": { - "serviceAccountName": "kubeflow-pipelines-viewer" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui-configmap - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml deleted file mode 100644 index c2b0b0572c..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-install-config-2829cc67f8.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - bucketName: mlpipeline - cacheDb: cachedb - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-install-config-2829cc67f8 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml deleted file mode 100644 index 3aef75a62e..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_configmap_pipeline-upstream-install-config-d7hkh24mdg.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - appName: pipeline - appVersion: 1.0.4 - bucketName: mlpipeline - cacheDb: cachedb - containerRuntimeExecutor: docker - dbHost: mysql - dbPort: "3306" - mlmdDb: metadb - pipelineDb: mlpipeline -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-upstream-install-config-d7hkh24mdg - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml deleted file mode 100644 index 0dd8344034..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_minio-pvc.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-pvc - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml deleted file mode 100644 index bf0c560da5..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_persistentvolumeclaim_mysql-pv-claim.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql-pv-claim - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 20Gi diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml deleted file mode 100644 index 2c774e447c..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mlpipeline-minio-artifact.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - accesskey: bWluaW8= - secretkey: bWluaW8xMjM= -kind: Secret -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: mlpipeline-minio-artifact - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml deleted file mode 100644 index 3490a9d7f1..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_secret_mysql-secret-fd5gktm75t.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -data: - password: "" - username: cm9vdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: mysql-secret-fd5gktm75t - namespace: kubeflow -type: Opaque diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_cache-server.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_cache-server.yaml deleted file mode 100644 index ab6cf5124e..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_cache-server.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: cache-server - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: webhook-api - selector: - app: cache-server - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_minio-service.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_minio-service.yaml deleted file mode 100644 index c7f0acee21..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_minio-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio - name: minio-service - namespace: kubeflow -spec: - ports: - - name: http - port: 9000 - protocol: TCP - targetPort: 9000 - selector: - app: minio - app.kubernetes.io/component: minio - app.kubernetes.io/name: minio diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 4b493f3119..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 71a24c4ada..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 4d23b20f01..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_mysql.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_mysql.yaml deleted file mode 100644 index da8f8cb93a..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_service_mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql - name: mysql - namespace: kubeflow -spec: - ports: - - port: 3306 - protocol: TCP - targetPort: 3306 - selector: - app: mysql - app.kubernetes.io/component: mysql - app.kubernetes.io/name: mysql diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml deleted file mode 100644 index a985549ba3..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache-deployer-sa.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache-deployer-sa - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml deleted file mode 100644 index f7555f0f35..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-cache.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-cache - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml deleted file mode 100644 index b0bbf5da53..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-container-builder.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-container-builder - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml deleted file mode 100644 index de94276552..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-metadata-writer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-metadata-writer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml deleted file mode 100644 index 9521f5b74d..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_kubeflow-pipelines-viewer.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: kubeflow-pipelines-viewer - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 5bc5786177..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 4a157173bc..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index 9318d09104..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index ff0696597e..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index 5c8e34b2a1..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline-visualizationserver - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index b95a37213c..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: ml-pipeline - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index 13fb2a95dd..0000000000 --- a/tests/stacks/openshift/application/pipeline/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: ml-pipeline - app.kubernetes.io/name: kubeflow-pipelines - name: pipeline-runner - namespace: kubeflow diff --git a/tests/stacks/openshift/application/profiles/kustomize_test.go b/tests/stacks/openshift/application/profiles/kustomize_test.go deleted file mode 100644 index 6c0ac2653a..0000000000 --- a/tests/stacks/openshift/application/profiles/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package profiles - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/profiles", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index ae5d66a08f..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 8d29ff183f..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.$(namespace).svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/openshift/application/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pytorch-job/kustomize_test.go b/tests/stacks/openshift/application/pytorch-job/kustomize_test.go deleted file mode 100644 index 8405d65784..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pytorch_job - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/pytorch-job", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 2dc516cbcc..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index 56a1457579..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-job-crds - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 44ea79a4b8..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index fec6851c6a..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index 161f232e59..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 57a5fc7f42..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 4f9ef4f8d3..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 13352b970d..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index cefdad39ee..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 4114ea5f9f..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 3d3555c2b1..0000000000 --- a/tests/stacks/openshift/application/pytorch-job/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/name: pytorch-operator - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/kustomize_test.go b/tests/stacks/openshift/application/seldon/kustomize_test.go deleted file mode 100644 index f4a6536e92..0000000000 --- a/tests/stacks/openshift/application/seldon/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package seldon - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/seldon", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 8f848d7a18..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,89 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index 6eeefa3a7d..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,89 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - port: 8443 - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index a797cdd212..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7196 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index f1b4a2d313..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/name: seldon-core-operator - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index 0d47a354ad..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,180 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=8443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 8443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 6c3efd48e1..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6e4d81dd4d..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index c90e2e5b38..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,227 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index b60307725c..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index 5b0af429d6..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index 9df2a4c962..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index f53272dc20..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index 07b8ffc17b..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index fd6cd9f3cb..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 423e612efa..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 8443 - targePort: 8443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon1 - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: v0.5 - control-plane: seldon-controller-manager diff --git a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index c25f425f49..0000000000 --- a/tests/stacks/openshift/application/seldon/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-core - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/version: 1.4.0 - name: seldon-manager - namespace: kubeflow diff --git a/tests/stacks/openshift/application/tf-job/kustomize_test.go b/tests/stacks/openshift/application/tf-job/kustomize_test.go deleted file mode 100644 index 3682f501eb..0000000000 --- a/tests/stacks/openshift/application/tf-job/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package tf_job - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../../stacks/openshift/application/tf-job", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index ebfcefbc9b..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index fc9715bb53..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-crds - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index 6e38dd861e..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index 8ecdd25f1b..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index 03147422e8..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 942e4a625a..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index 3ebf508e03..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index ac48bdc241..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index b69f8e4e4b..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index a13b8ac441..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3e0982e277..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index f7bf874b73..0000000000 --- a/tests/stacks/openshift/application/tf-job/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/name: tf-job-operator - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/stacks/openshift/kustomize_test.go b/tests/stacks/openshift/kustomize_test.go deleted file mode 100644 index 4a884375c6..0000000000 --- a/tests/stacks/openshift/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package openshift - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../stacks/openshift", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/stacks/openshift/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/stacks/openshift/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index c299e91151..0000000000 --- a/tests/stacks/openshift/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,158 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index b4e7f9a329..0000000000 --- a/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml b/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml deleted file mode 100644 index 8cd652ede1..0000000000 --- a/tests/stacks/openshift/test_data/expected/app.k8s.io_v1beta1_application_profiles-profiles.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/stacks/openshift/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 97c68db5d0..0000000000 --- a/tests/stacks/openshift/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/stacks/openshift/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/stacks/openshift/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index 84f02cdbd0..0000000000 --- a/tests/stacks/openshift/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - kustomize.component: profiles - spec: - containers: - - args: null - command: - - /manager - - -userid-header - - $(USERID_HEADER) - - -userid-prefix - - $(USERID_PREFIX) - - -workload-identity - - $(WORKLOAD_IDENTITY) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - - name: WORKLOAD_IDENTITY - valueFrom: - configMapKeyRef: - key: gcp-sa - name: profiles-profiles-config-4mgcmtgk6t - image: quay.io/kubeflow/profile-controller:v1.1.0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: null - command: - - /access-management - - -cluster-admin - - $(CLUSTER_ADMIN) - - -userid-prefix - - $(USERID_PREFIX) - - -userid-header - - $(USERID_HEADER) - env: - - name: USERID_HEADER - valueFrom: - configMapKeyRef: - key: userid-header - name: kubeflow-config-f5fk62kk74 - - name: USERID_PREFIX - valueFrom: - configMapKeyRef: - key: userid-prefix - name: kubeflow-config-f5fk62kk74 - - name: CLUSTER_ADMIN - valueFrom: - configMapKeyRef: - key: admin - name: profiles-profiles-config-4mgcmtgk6t - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index b08a52c193..0000000000 --- a/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml b/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml deleted file mode 100644 index 1bfe3a5c76..0000000000 --- a/tests/stacks/openshift/test_data/expected/networking.istio.io_v1alpha3_virtualservice_profiles-kfam.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index e03c239a0e..0000000000 --- a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index d565c5c876..0000000000 --- a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index 663e87dbcd..0000000000 --- a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index cd4c3a1042..0000000000 --- a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 044a3a2b1e..0000000000 --- a/tests/stacks/openshift/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml deleted file mode 100644 index e185ae451f..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_centraldashboard-links-config.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: v1 -data: - links: |- - { - "menuLinks": [ - { - "link": "/pipeline/", - "text": "Pipelines" - }, - { - "link": "/jupyter/", - "text": "Notebook Servers" - }, - { - "link": "/katib/", - "text": "Katib" - } - ], - "externalLinks": [], - "quickLinks": [ - { - "text": "Upload a pipeline", - "desc": "Pipelines", - "link": "/pipeline/" - }, - { - "text": "View all pipeline runs", - "desc": "Pipelines", - "link": "/pipeline/#/runs" - }, - { - "text": "Create a new Notebook server", - "desc": "Notebook Servers", - "link": "/jupyter/new?namespace=kubeflow" - }, - { - "text": "View Katib Experiments", - "desc": "Katib", - "link": "/katib/" - } - ], - "documentationItems": [ - { - "text": "Getting Started with Kubeflow", - "desc": "Get your machine-learning workflow up and running on Kubeflow", - "link": "https://www.kubeflow.org/docs/started/getting-started/" - }, - { - "text": "MiniKF", - "desc": "A fast and easy way to deploy Kubeflow locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikf/" - }, - { - "text": "Microk8s for Kubeflow", - "desc": "Quickly get Kubeflow running locally on native hypervisors", - "link": "https://www.kubeflow.org/docs/started/getting-started-multipass/" - }, - { - "text": "Minikube for Kubeflow", - "desc": "Quickly get Kubeflow running locally", - "link": "https://www.kubeflow.org/docs/started/getting-started-minikube/" - }, - { - "text": "Kubeflow on GCP", - "desc": "Running Kubeflow on Kubernetes Engine and Google Cloud Platform", - "link": "https://www.kubeflow.org/docs/gke/" - }, - { - "text": "Kubeflow on AWS", - "desc": "Running Kubeflow on Elastic Container Service and Amazon Web Services", - "link": "https://www.kubeflow.org/docs/aws/" - }, - { - "text": "Requirements for Kubeflow", - "desc": "Get more detailed information about using Kubeflow and its components", - "link": "https://www.kubeflow.org/docs/started/requirements/" - } - ] - } -kind: ConfigMap -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard-links-config - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml deleted file mode 100644 index 8e699a0a15..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_kubeflow-config-f5fk62kk74.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - clusterdomain: "" - namespace: "" - userid-header: kubeflow-userid - userid-prefix: "" -kind: ConfigMap -metadata: - name: kubeflow-config-f5fk62kk74 - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml deleted file mode 100644 index e77d6f69ed..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_configmap_profiles-profiles-config-4mgcmtgk6t.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - admin: "" - gcp-sa: "" -kind: ConfigMap -metadata: - labels: - kustomize.component: profiles - name: profiles-profiles-config-4mgcmtgk6t - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index 71121ed40f..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.$(namespace) - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index db1f50bd7d..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - kustomize.component: profiles diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 4dc6b12cfc..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 881ccbf1bd..0000000000 --- a/tests/stacks/openshift/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/test_util.go b/tests/test_util.go deleted file mode 100644 index ee90529f77..0000000000 --- a/tests/test_util.go +++ /dev/null @@ -1,197 +0,0 @@ -package tests - -import ( - "fmt" - "io/ioutil" - "path/filepath" - "strings" - "testing" - - "github.com/ghodss/yaml" - "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" - "sigs.k8s.io/kustomize/v3/k8sdeps/kunstruct" - "sigs.k8s.io/kustomize/v3/k8sdeps/transformer" - "sigs.k8s.io/kustomize/v3/pkg/fs" - "sigs.k8s.io/kustomize/v3/pkg/loader" - "sigs.k8s.io/kustomize/v3/pkg/plugins" - "sigs.k8s.io/kustomize/v3/pkg/resmap" - "sigs.k8s.io/kustomize/v3/pkg/resource" - "sigs.k8s.io/kustomize/v3/pkg/target" - "sigs.k8s.io/kustomize/v3/pkg/validators" -) - -type KustomizeTestCase struct { - // Package is the path to the kustomize directory to run kustomize in - Package string - // Expected is a path to a directory containing the expected resources - Expected string -} - -// RunTestCase runs the specified test case -func RunTestCase(t *testing.T, testCase *KustomizeTestCase) { - expected := map[string]*expectedResource{} - - // Read all the YAML files containing expected resources and parse them. - files, err := ioutil.ReadDir(testCase.Expected) - if err != nil { - t.Fatal(err) - } - - for _, f := range files { - contents, err := ioutil.ReadFile(filepath.Join(testCase.Expected, f.Name())) - if err != nil { - t.Fatalf("Err: %v", err) - } - - u := &unstructured.Unstructured{} - if err := yaml.Unmarshal([]byte(contents), u); err != nil { - t.Fatalf("Error: %v", err) - } - - r := &expectedResource{ - fileName: f.Name(), - yaml: string(contents), - u: u, - } - - expected[r.Key()] = r - } - - fsys := fs.MakeRealFS() - // We don't want to enforce the security check. - // This is equivalent to running: - // kustomize build --load_restrictor none - lrc := loader.RestrictionNone - _loader, loaderErr := loader.NewLoader(lrc, validators.MakeFakeValidator(), testCase.Package, fsys) - if loaderErr != nil { - t.Fatalf("could not load kustomize loader: %v", loaderErr) - } - rf := resmap.NewFactory(resource.NewFactory(kunstruct.NewKunstructuredFactoryImpl()), transformer.NewFactoryImpl()) - pc := plugins.DefaultPluginConfig() - kt, err := target.NewKustTarget(_loader, rf, transformer.NewFactoryImpl(), plugins.NewLoader(pc, rf)) - if err != nil { - t.Fatalf("Unexpected construction error %v", err) - } - actual, err := kt.MakeCustomizedResMap() - if err != nil { - t.Fatalf("Err: %v", err) - } - - actualNames := map[string]bool{} - - // Check that all the actual resources match the expected resources - for _, r := range actual.Resources() { - rKey := key(r.GetKind(), r.GetName()) - actualNames[rKey] = true - - e, ok := expected[rKey] - - if !ok { - t.Errorf("Actual output included an unexpected resource; resource: %v", rKey) - continue - } - - actualYaml, err := r.AsYAML() - - if err != nil { - t.Errorf("Could not generate YAML for resource: %v; error: %v", rKey, err) - continue - } - // Ensure the actual YAML matches. - if string(actualYaml) != e.yaml { - ReportDiffAndFail(t, actualYaml, e.yaml) - } - } - - // Make sure we aren't missing any expected resources - for name, _ := range expected { - if _, ok := actualNames[name]; !ok { - t.Errorf("Actual resources is missing expected resource: %v", name) - } - } -} - -func convertToArray(x string) ([]string, int) { - a := strings.Split(strings.TrimSuffix(x, "\n"), "\n") - maxLen := 0 - for i, v := range a { - z := tabToSpace(v) - if len(z) > maxLen { - maxLen = len(z) - } - a[i] = z - } - return a, maxLen -} - -// expectedResource represents an expected Kubernetes resource to be generated -// from the kustomize package. -type expectedResource struct { - fileName string - yaml string - u *unstructured.Unstructured -} - -// key generates a name to index resources by. It is used to match expected and actual resources. -func key(kind string, name string) string { - return kind + "." + name -} - -// Key returns a unique identifier fo this resource that can be used to index it -func (r *expectedResource) Key() string { - if r.u == nil { - return "" - } - - return key(r.u.GetKind(), r.u.GetName()) -} - -// Pretty printing of file differences. -func ReportDiffAndFail(t *testing.T, actual []byte, expected string) { - sE, maxLen := convertToArray(expected) - sA, _ := convertToArray(string(actual)) - fmt.Println("===== ACTUAL BEGIN ========================================") - fmt.Print(string(actual)) - fmt.Println("===== ACTUAL END ==========================================") - format := fmt.Sprintf("%%s %%-%ds %%s\n", maxLen+4) - limit := 0 - if len(sE) < len(sA) { - limit = len(sE) - } else { - limit = len(sA) - } - fmt.Printf(format, " ", "EXPECTED", "ACTUAL") - fmt.Printf(format, " ", "--------", "------") - for i := 0; i < limit; i++ { - fmt.Printf(format, hint(sE[i], sA[i]), sE[i], sA[i]) - } - if len(sE) < len(sA) { - for i := len(sE); i < len(sA); i++ { - fmt.Printf(format, "X", "", sA[i]) - } - } else { - for i := len(sA); i < len(sE); i++ { - fmt.Printf(format, "X", sE[i], "") - } - } - t.Fatalf("Expected not equal to actual") -} - -func tabToSpace(input string) string { - var result []string - for _, i := range input { - if i == 9 { - result = append(result, " ") - } else { - result = append(result, string(i)) - } - } - return strings.Join(result, "") -} - -func hint(a, b string) string { - if a == b { - return " " - } - return "X" -} diff --git a/tests/testdata_gcp_kpt/gcp/Kptfile b/tests/testdata_gcp_kpt/gcp/Kptfile deleted file mode 100644 index 5dff1d5e69..0000000000 --- a/tests/testdata_gcp_kpt/gcp/Kptfile +++ /dev/null @@ -1,876 +0,0 @@ -apiVersion: kpt.dev/v1alpha1 -kind: Kptfile -metadata: - name: . -packageMetadata: - shortDescription: GCP blueprint configs. -openAPI: - definitions: - io.k8s.cli.setters.gcloud.core.project: - x-k8s-cli: - setter: - name: gcloud.core.project - value: customerProject - isSet: true - io.k8s.cli.setters.name: - x-k8s-cli: - setter: - name: name - value: testKptName - isSet: true - io.k8s.cli.setters.gcloud.compute.zone: - x-k8s-cli: - setter: - name: gcloud.compute.zone - value: testZone - isSet: true - io.k8s.cli.setters.gcloud.compute.region: - x-k8s-cli: - setter: - name: gcloud.compute.region - value: testRegion - isSet: true - io.k8s.cli.setters.location: - x-k8s-cli: - setter: - name: location - value: testLocation - isSet: true - io.k8s.cli.setters.log-firewalls: - x-k8s-cli: - setter: - name: log-firewalls - value: "true" - isSet: true - io.k8s.cli.substitutions.name-storage-metadata-store: - x-k8s-cli: - substitution: - name: name-storage-metadata-store - pattern: ${name}-storage-metadata-store - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-storage-artifact-store: - x-k8s-cli: - substitution: - name: name-storage-artifact-store - pattern: ${name}-storage-artifact-store - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-ip: - x-k8s-cli: - substitution: - name: name-ip - pattern: ${name}-ip - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-gcr: - x-k8s-cli: - substitution: - name: name-gcr - pattern: ${name}-gcr - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-gcr-cname: - x-k8s-cli: - substitution: - name: name-gcr-cname - pattern: ${name}-gcr-cname - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-gcr-a: - x-k8s-cli: - substitution: - name: name-gcr-a - pattern: ${name}-gcr-a - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-goog-apis: - x-k8s-cli: - substitution: - name: name-goog-apis - pattern: ${name}-goog-apis - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-goog-cname: - x-k8s-cli: - substitution: - name: name-goog-cname - pattern: ${name}-goog-cname - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-goog-a: - x-k8s-cli: - substitution: - name: name-goog-a - pattern: ${name}-goog-a - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-google-apis: - x-k8s-cli: - substitution: - name: name-google-apis - pattern: ${name}-google-apis - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-internet: - x-k8s-cli: - substitution: - name: name-internet - pattern: ${name}-internet - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-deny-egress: - x-k8s-cli: - substitution: - name: name-deny-egress - pattern: ${name}-deny-egress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-health-ingress: - x-k8s-cli: - substitution: - name: name-health-ingress - pattern: ${name}-health-ingress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-health-egress: - x-k8s-cli: - substitution: - name: name-health-egress - pattern: ${name}-health-egress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-apis-egress: - x-k8s-cli: - substitution: - name: name-apis-egress - pattern: ${name}-apis-egress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-master-egress: - x-k8s-cli: - substitution: - name: name-master-egress - pattern: ${name}-master-egress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-int-egress: - x-k8s-cli: - substitution: - name: name-int-egress - pattern: ${name}-int-egress - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-istio: - x-k8s-cli: - substitution: - name: name-istio - pattern: ${name}-istio - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-cm: - x-k8s-cli: - substitution: - name: name-cm - pattern: ${name}-cm - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-dockerhub: - x-k8s-cli: - substitution: - name: name-dockerhub - pattern: ${name}-dockerhub - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-iap-jwks: - x-k8s-cli: - substitution: - name: name-iap-jwks - pattern: ${name}-iap-jwks - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-ui: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-ui - pattern: ${name}-user-workload-identity-user-ml-pipeline-ui - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-visualization: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-visualization - pattern: ${name}-user-workload-identity-user-ml-pipeline-visualization - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-visualizationserver: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-visualizationserver - pattern: ${name}-user-workload-identity-user-ml-pipeline-visualizationserver - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-workload-identity-user-pipeline-runner: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-pipeline-runner - pattern: ${name}-user-workload-identity-user-pipeline-runner - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-ui-member: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-ui-member - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/ml-pipeline-ui] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-visualization-member: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-visualization-member - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/ml-pipeline-visualization] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.name-user-workload-identity-user-ml-pipeline-visualizationserver-member: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-ml-pipeline-visualizationserver-member - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/ml-pipeline-visualizationserver] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.name-user-workload-identity-user-pipeline-runner-member: - x-k8s-cli: - substitution: - name: name-user-workload-identity-user-pipeline-runner-member - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/pipeline-runner] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.name-user-cloudbuild: - x-k8s-cli: - substitution: - name: name-user-cloudbuild - pattern: ${name}-user-cloudbuild - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-viewer: - x-k8s-cli: - substitution: - name: name-user-viewer - pattern: ${name}-user-viewer - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-source: - x-k8s-cli: - substitution: - name: name-user-source - pattern: ${name}-user-source - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-storage: - x-k8s-cli: - substitution: - name: name-user-storage - pattern: ${name}-user-storage - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-bigquery: - x-k8s-cli: - substitution: - name: name-user-bigquery - pattern: ${name}-user-bigquery - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-dataflow: - x-k8s-cli: - substitution: - name: name-user-dataflow - pattern: ${name}-user-dataflow - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-ml: - x-k8s-cli: - substitution: - name: name-user-ml - pattern: ${name}-user-ml - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-dataproc: - x-k8s-cli: - substitution: - name: name-user-dataproc - pattern: ${name}-user-dataproc - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-cloudsql: - x-k8s-cli: - substitution: - name: name-user-cloudsql - pattern: ${name}-user-cloudsql - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-logging: - x-k8s-cli: - substitution: - name: name-user-logging - pattern: ${name}-user-logging - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-metricwriter: - x-k8s-cli: - substitution: - name: name-user-metricwriter - pattern: ${name}-user-metricwriter - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-user-monitoringviewer: - x-k8s-cli: - substitution: - name: name-user-monitoringviewer - pattern: ${name}-user-monitoringviewer - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-logging: - x-k8s-cli: - substitution: - name: name-vm-policy-logging - pattern: ${name}-vm-logging - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-monitoring: - x-k8s-cli: - substitution: - name: name-vm-policy-monitoring - pattern: ${name}-vm-policy-monitoring - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-meshtelemetry: - x-k8s-cli: - substitution: - name: name-vm-policy-meshtelemetry - pattern: ${name}-vm-policy-meshtelemetry - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-cloudtrace: - x-k8s-cli: - substitution: - name: name-vm-policy-cloudtrace - pattern: ${name}-vm-policy-cloudtrace - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-monitoring-viewer: - x-k8s-cli: - substitution: - name: name-vm-policy-monitoring-viewer - pattern: ${name}-vm-policy-monitoring-viewer - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm-policy-storage: - x-k8s-cli: - substitution: - name: name-vm-policy-storage - pattern: ${name}-vm-policy-storage - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.cluster-name: - x-k8s-cli: - substitution: - name: cluster-name - pattern: ${gcloud.core.project}/${location}/${name} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.identity-ns: - x-k8s-cli: - substitution: - name: identity-ns - pattern: ${gcloud.core.project}.svc.id.goog - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.admin-sa-name: - x-k8s-cli: - substitution: - name: admin-sa-name - pattern: ${name}-admin - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.user-sa-name: - x-k8s-cli: - substitution: - name: user-sa-name - pattern: ${name}-user - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-admin-wi: - x-k8s-cli: - substitution: - name: name-admin-wi - pattern: ${name}-admin-workload-identity-user - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-profiles-sa-wi: - x-k8s-cli: - substitution: - name: admin-profiles-sa-wi - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/profiles-controller-service-account] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.user-wi-ml-pipeline-ui: - x-k8s-cli: - substitution: - name: user-wi-ml-pipeline-ui - pattern: ${name}-user-workload-identity-user-ml-pipeline-ui - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.user-wi-ml-pipeline-visualizationserver: - x-k8s-cli: - substitution: - name: user-wi-ml-pipeline-visualizationserver - pattern: ${name}-user-workload-identity-user-ml-pipeline-visualizationserver - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.user-wi-pipeline-runner: - x-k8s-cli: - substitution: - name: user-wi-pipeline-runner - pattern: ${name}-user-workload-identity-user-pipeline-runner - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.projects: - x-k8s-cli: - substitution: - name: projects - pattern: projects/${gcloud.core.project} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.admin-service-account: - x-k8s-cli: - substitution: - name: admin-service-account - pattern: serviceAccount:${name}-admin@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.user-service-account: - x-k8s-cli: - substitution: - name: user-service-account - pattern: serviceAccount:${name}-user@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.vm-service-account: - x-k8s-cli: - substitution: - name: vm-service-account - pattern: serviceAccount:${name}-vm@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.vm-sa-ref: - x-k8s-cli: - substitution: - name: vm-sa-ref - pattern: ${name}-vm@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.admin-sa-ref: - x-k8s-cli: - substitution: - name: admin-sa-ref - pattern: ${name}-admin@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.user-sa-ref: - x-k8s-cli: - substitution: - name: user-sa-ref - pattern: ${name}-user@${gcloud.core.project}.iam.gserviceaccount.com - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.node-pool-cpu: - x-k8s-cli: - substitution: - name: node-pool-cpu - pattern: ${name}-cpu-pool-v1 - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-admin-manages-user: - x-k8s-cli: - substitution: - name: name-admin-manages-user - pattern: ${name}-admin-manages-user - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-source-iam: - x-k8s-cli: - substitution: - name: admin-source-iam - pattern: ${name}-admin-source - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-servicemanagement-iam: - x-k8s-cli: - substitution: - name: admin-servicemanagement-iam - pattern: ${name}-admin-servicemanagement - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-network-iam: - x-k8s-cli: - substitution: - name: admin-network-iam - pattern: ${name}-admin-network - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-cloudbuild-iam: - x-k8s-cli: - substitution: - name: admin-cloudbuild-iam - pattern: ${name}-admin-cloudbuild - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-viewer-iam: - x-k8s-cli: - substitution: - name: admin-viewer-iam - pattern: ${name}-admin-viewer - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-storage-iam: - x-k8s-cli: - substitution: - name: admin-storage-iam - pattern: ${name}-admin-storage - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-bigquery-iam: - x-k8s-cli: - substitution: - name: admin-bigquery-iam - pattern: ${name}-admin-bigquery - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-dataflow-iam: - x-k8s-cli: - substitution: - name: admin-dataflow-iam - pattern: ${name}-admin-dataflow - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-ml-iam: - x-k8s-cli: - substitution: - name: admin-ml-iam - pattern: ${name}-admin-ml - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-dataproc-iam: - x-k8s-cli: - substitution: - name: admin-dataproc-iam - pattern: ${name}-admin-dataproc - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-cloudsql-iam: - x-k8s-cli: - substitution: - name: admin-cloudsql-iam - pattern: ${name}-admin-cloudsql - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-logging-iam: - x-k8s-cli: - substitution: - name: admin-logging-iam - pattern: ${name}-admin-logging - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-metricwriter-iam: - x-k8s-cli: - substitution: - name: admin-metricwriter-iam - pattern: ${name}-admin-metricwriter - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.admin-monitoringviewer-iam: - x-k8s-cli: - substitution: - name: admin-monitoringviewer-iam - pattern: ${name}-admin-monitoringviewer - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-vm: - x-k8s-cli: - substitution: - name: name-vm - pattern: ${name}-vm - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.setters.gcloud.project.projectNumber: - x-k8s-cli: - setter: - name: gcloud.project.projectNumber - value: "999911112222" - isSet: true - io.k8s.cli.substitutions.asm-gcp-metadata: - x-k8s-cli: - substitution: - name: asm-gcp-metadata - pattern: ${gcloud.core.project}|${gcloud.project.projectNumber}|${name}|${location} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${gcloud.project.projectNumber} - ref: '#/definitions/io.k8s.cli.setters.gcloud.project.projectNumber' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - io.k8s.cli.substitutions.asm-cluster-url: - x-k8s-cli: - substitution: - name: asm-cluster-url - pattern: https://container.googleapis.com/v1/projects/${gcloud.core.project}/locations/${location}/clusters/${name} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.asm-mesh-id: - x-k8s-cli: - substitution: - name: asm-mesh-id - pattern: ${gcloud.core.project}_${location}_${name} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.mesh-id: - x-k8s-cli: - substitution: - name: mesh-id - pattern: ${gcloud.core.project}_${location}_${name} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.asm-cluster-name: - x-k8s-cli: - substitution: - name: asm-cluster-name - pattern: ${gcloud.core.project}/${location}/${name} - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - - marker: ${location} - ref: '#/definitions/io.k8s.cli.setters.location' - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.image-mirror-quay-io-jetstack: - x-k8s-cli: - substitution: - name: image-mirror-quay-io-jetstack - pattern: gcr.io/${gcloud.core.project}/mirror/quay.io/jetstack - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.image-mirror-kubeflow-images-public: - x-k8s-cli: - substitution: - name: image-mirror-kubeflow-images-public - pattern: gcr.io/${gcloud.core.project}/mirror/gcr.io/kubeflow-images-public - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.image-mirror-metacontroller: - x-k8s-cli: - substitution: - name: image-mirror-metacontroller - pattern: gcr.io/${gcloud.core.project}/mirror/metacontroller - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.name-admin-kubeflow-wi: - x-k8s-cli: - substitution: - name: name-admin-kubeflow-wi - pattern: ${name}-admin-kubeflow-wi - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.name-admin-istio-wi: - x-k8s-cli: - substitution: - name: name-admin-istio-wi - pattern: ${name}-admin-istio-wi - values: - - marker: ${name} - ref: '#/definitions/io.k8s.cli.setters.name' - io.k8s.cli.substitutions.iampolicy-member-kfadmin-kubeflow: - x-k8s-cli: - substitution: - name: iampolicy-member-kfadmin-kubeflow - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[kubeflow/kf-admin] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.iampolicy-member-kfadmin-istio: - x-k8s-cli: - substitution: - name: iampolicy-member-kfadmin-istio - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[istio/kf-admin] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.substitutions.iampolicy-member-kfadmin-istio-system: - x-k8s-cli: - substitution: - name: iampolicy-member-kfadmin-istio-system - pattern: serviceAccount:${gcloud.core.project}.svc.id.goog[istio-system/kf-admin] - values: - - marker: ${gcloud.core.project} - ref: '#/definitions/io.k8s.cli.setters.gcloud.core.project' - io.k8s.cli.setters.mgmt-location: - x-k8s-cli: - setter: - name: mgmt-location - value: us-central1-f - io.k8s.cli.setters.mgmt-name: - x-k8s-cli: - setter: - name: mgmt-name - value: testMgmtName - isSet: true - io.k8s.cli.setters.mgmt-project: - x-k8s-cli: - setter: - name: mgmt-project - value: mgmt-project-id - io.k8s.cli.substitutions.mgmt-cluster-name: - x-k8s-cli: - substitution: - name: mgmt-cluster-name - pattern: ${mgmt-project}/${mgmt-location}/${mgmt-name} - values: - - marker: ${mgmt-project} - ref: '#/definitions/io.k8s.cli.setters.mgmt-project' - - marker: ${mgmt-location} - ref: '#/definitions/io.k8s.cli.setters.mgmt-location' - - marker: ${mgmt-name} - ref: '#/definitions/io.k8s.cli.setters.mgmt-name' - io.k8s.cli.substitutions.mgmt-pool: - x-k8s-cli: - substitution: - name: mgmt-pool - pattern: ${mgmt-name}-pool - values: - - marker: ${mgmt-name} - ref: '#/definitions/io.k8s.cli.setters.mgmt-name' - io.k8s.cli.substitutions.mgmt-cnrm-sa: - x-k8s-cli: - substitution: - name: mgmt-cnrm-sa - pattern: serviceAccount:${mgmt-project}.svc.id.goog[cnrm-system/cnrm-controller-manager] - values: - - marker: ${mgmt-project} - ref: '#/definitions/io.k8s.cli.setters.mgmt-project' diff --git a/tests/testdata_gcp_kpt/gcp/v2/README.md b/tests/testdata_gcp_kpt/gcp/v2/README.md deleted file mode 100644 index daf71f87c8..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/README.md +++ /dev/null @@ -1,88 +0,0 @@ -# Alpha: Kubeflow on KCC Installation Guide - -This instruction explains how to set up Kubeflow on top of Config Connector (KCC) and Anthos Service Mesh (ASM). -Compared with the currently documented GCP deployment, this architecture uses KCC instead of Deployment Manager, and service mesh in the form of ASM instead of open source Istio. - -Assume using IAP to protect the kubeflow UI endpoint. - -### Benefits of using KCC - -[KCC](https://cloud.google.com/config-connector) is a Google Kubernetes Engine (GKE) addon that allows you to manage your Google Cloud resources through Kubernetes configuration. -With KCC users can manage their Google Cloud infrastructure the same way as manage Kubernetes applications (Infrastructure as code). - - -### Benefits of using ASM - -[ASM](https://cloud.google.com/service-mesh/docs/overview) is a GCP distribution of Istio with more Observability features & Security features. - -## Installation Steps - - -#### Step 0: Setup KCC -If you don't have a running KCC controller yet, follow [KCC instructions](https://cloud.google.com/config-connector/docs/how-to/install-upgrade-uninstall) to create a KCC controller for your organization. -We recommend “Namespaced mode” for KCC controller setup. - -From now on assume your KCC controller was hosted in project `kcc-host-project-id`. -Each Project managed by KCC will have a namespace in the KCC cluster named after project id. For example Project “kubeflow-project-id” will linked to a namespace named “kubeflow-project-id” in KCC cluster. -Kfctl | anthoscli | ACP - -#### Step 1: Create GCP resources through KCC -* Install kpt - - ``` - gcloud components install kpt alpha - gcloud components update - ``` - -* Set project-id / zone / cluster name - - Checkout latest kubeflow/manifests repo; cd manifests/gcp - - Choose a cluster name `export CLUSTER_NAME=choose-name` - - ``` - kpt cfg set v2 gcloud.core.project $(gcloud config get-value project) - kpt cfg set v2 cluster-name $(CLUSTER_NAME) - kpt cfg set v2 gcloud.compute.zone $(gcloud config get-value compute/zone) - ``` - -* Connect kubectl to KCC cluster - - `gcloud container clusters get-credentials --zone <> --project ` - -* Apply CNRM resources - - `kustomize build v2/cnrm | kubectl apply -n -f -` - - -#### Step 2: Install ASM -Install ASM on the newly created kubeflow cluster `CLUSTER_NAME` - -* Connect kubectl to the new kubeflow cluster `CLUSTER_NAME` - - `gcloud container clusters get-credentials $(CLUSTER_NAME) --zone <> --project ` - -* [Set credentials and permissions](https://cloud.google.com/service-mesh/docs/gke-install-existing-cluster#set_credentials_and_permissions) - -* [Download istioctl released by GCP](https://cloud.google.com/service-mesh/docs/gke-install-existing-cluster#download_the_installation_file) - -* Run Istioctl (download in previous step) - - `istioctl manifest apply -f v2/asm/istio-operator.yaml` - - -#### Step 3: Deploy Kubeflow components - -* [Setup Environment Variables for IAP](https://www.kubeflow.org/docs/gke/deploy/oauth-setup/) - - ``` - export CLIENT_ID= - export CLIENT_SECRET= - ``` - -* Install Kubeflow on the newly created cluster - - ``` - mkdir $(CLUSTER_NAME) && cd $(CLUSTER_NAME) - kfctl apply -V -f https://raw.githubusercontent.com/kubeflow/manifests/master/kfdef/kfctl_gcp_asm_exp.yaml - ``` \ No newline at end of file diff --git a/tests/testdata_gcp_kpt/gcp/v2/asm/istio-operator.yaml b/tests/testdata_gcp_kpt/gcp/v2/asm/istio-operator.yaml deleted file mode 100644 index 09a1542071..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/asm/istio-operator.yaml +++ /dev/null @@ -1,38 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -apiVersion: install.istio.io/v1alpha2 -kind: IstioControlPlane -metadata: - clusterName: "customerProject/testLocation/testKptName" # {"$kpt-set":"asm-cluster-name"} -spec: - profile: asm - hub: gcr.io/gke-release/asm - tag: 1.4.7-asm.0 - values: - gateways: - istio-ingressgateway: - type: NodePort - global: - meshID: "customerProject_testLocation_testKptName" # {"$kpt-set":"asm-mesh-id"} - trustDomain: "customerProject.svc.id.goog" # {"$kpt-set":"identity-ns"} - sds: - token: - aud: "customerProject.svc.id.goog" # {"$kpt-set":"identity-ns"} - proxy: - env: - GCP_METADATA: "customerProject|999911112222|testKptName|testLocation" # {"$kpt-set":"asm-gcp-metadata"} - nodeagent: - env: - GKE_CLUSTER_URL: "https://container.googleapis.com/v1/projects/customerProject/locations/testLocation/clusters/testKptName" # {"$kpt-set":"asm-cluster-url"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/README.md b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/README.md deleted file mode 100644 index 0ec31e0634..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/README.md +++ /dev/null @@ -1,17 +0,0 @@ -. -================================================== - -# NAME - - . - -# SYNOPSIS - - kubectl apply --recursive -f . - -# Description - -sample description - -# SEE ALSO - diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/cluster.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/cluster.yaml deleted file mode 100644 index 30a60a4760..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/cluster.yaml +++ /dev/null @@ -1,62 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -# TODO(kunming): kustomize this config to include all the options we currently offer through DM - -apiVersion: container.cnrm.cloud.google.com/v1beta1 -kind: ContainerCluster -metadata: - clusterName: "customerProject/testLocation/testKptName" # {"$kpt-set":"cluster-name"} - labels: - mesh_id: "customerProject_testLocation_testKptName" # {"$kpt-set":"mesh-id"} - name: testKptName # {"$kpt-set":"name"} -spec: - initialNodeCount: 2 - clusterAutoscaling: - enabled: true - autoProvisioningDefaults: - oauthScopes: - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring - - https://www.googleapis.com/auth/devstorage.read_only - serviceAccountRef: - name: testKptName-vm # {"$kpt-set":"name-vm"} - resourceLimits: - - resourceType: cpu - maximum: 128 - - resourceType: memory - maximum: 2000 - - resourceType: nvidia-tesla-k80 - maximum: 16 - releaseChannel: - # Per https://github.com/GoogleCloudPlatform/k8s-config-connector/issues/194 - # use upper case for the channels - channel: REGULAR - location: testLocation # {"$kpt-set":"location"} - workloadIdentityConfig: - identityNamespace: customerProject.svc.id.goog # {"$kpt-set":"identity-ns"} - loggingService: logging.googleapis.com/kubernetes - monitoringService: monitoring.googleapis.com/kubernetes - nodeConfig: - machineType: n1-standard-8 - metadata: - disable-legacy-endpoints: "true" - oauthScopes: - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring - - https://www.googleapis.com/auth/devstorage.read_only - serviceAccountRef: - name: testKptName-vm # {"$kpt-set":"name-vm"} - workloadMetadataConfig: - nodeMetadata: GKE_METADATA_SERVER diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-policy.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-policy.yaml deleted file mode 100644 index 4cdcad6c84..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-policy.yaml +++ /dev/null @@ -1,71 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-logging # {"$kpt-set":"name-vm-policy-logging"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/logging.logWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-policy-monitoring # {"$kpt-set":"name-vm-policy-monitoring"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/monitoring.metricWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-policy-meshtelemetry # {"$kpt-set":"name-vm-policy-meshtelemetry"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/meshtelemetry.reporter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-policy-cloudtrace # {"$kpt-set":"name-vm-policy-cloudtrace"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/cloudtrace.agent - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-policy-monitoring-viewer # {"$kpt-set":"name-vm-policy-monitoring-viewer"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/monitoring.viewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-vm-policy-storage # {"$kpt-set":"name-vm-policy-storage"} -spec: - member: serviceAccount:testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-service-account"} - role: roles/storage.objectViewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-sa.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-sa.yaml deleted file mode 100644 index 981d5b3389..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kf-vm-sa.yaml +++ /dev/null @@ -1,20 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMServiceAccount -metadata: - name: testKptName-vm # {"$kpt-set":"name-vm"} -spec: - displayName: kubeflow vm service account diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kustomization.yaml deleted file mode 100644 index 656866a4bc..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/kustomization.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- cluster.yaml -- kf-vm-policy.yaml -- kf-vm-sa.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/nodepool.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/nodepool.yaml deleted file mode 100644 index 23d31ce072..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/cluster/nodepool.yaml +++ /dev/null @@ -1,35 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -apiVersion: container.cnrm.cloud.google.com/v1beta1 -kind: ContainerNodePool -metadata: - clusterName: "customerProject/testLocation/testKptName" # {"$kpt-set":"cluster-name"} - name: testKptName-cpu-pool-v1 # {"$kpt-set":"node-pool-cpu"} -spec: - initialNodeCount: 2 - autoscaling: - minNodeCount: 2 - maxNodeCount: 8 - nodeConfig: - machineType: n1-standard-8 - minCpuPlatform: 'Intel Broadwell' - metadata: - disable-legacy-endpoints: "true" - serviceAccountRef: - name: testKptName-vm@customerProject.iam.gserviceaccount.com # {"$kpt-set":"vm-sa-ref"} - workloadMetadataConfig: - nodeMetadata: GKE_METADATA_SERVER - clusterRef: - name: testKptName # {"$kpt-set":"name"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/gcp-services.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/gcp-services.yaml deleted file mode 100644 index 9f72869e6a..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/gcp-services.yaml +++ /dev/null @@ -1,143 +0,0 @@ -# GKE -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: container.googleapis.com ---- -# Cloud Build -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: cloudbuild.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: compute.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: monitoring.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: logging.googleapis.com - -# TODO(jlewi): Does order matter? ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: meshca.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: meshtelemetry.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: meshconfig.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: iamcredentials.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: anthos.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: gkeconnect.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: gkehub.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: cloudresourcemanager.googleapis.com ---- -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: iap.googleapis.com diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/admin-manages-user-policy.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/admin-manages-user-policy.yaml deleted file mode 100644 index 10c4115208..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/admin-manages-user-policy.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-manages-user # {"$kpt-set":"name-admin-manages-user"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - # "roles/serviceAccountAdmin" grants kf-admin service account permission to - # manage workload identity binding policies for kf-user service account. - role: roles/iam.serviceAccountAdmin - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-user # {"$kpt-set":"user-sa-name"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-policy.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-policy.yaml deleted file mode 100644 index 9f2f408f79..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-policy.yaml +++ /dev/null @@ -1,167 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-source # {"$kpt-set":"admin-source-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/source.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-servicemanagement # {"$kpt-set":"admin-servicemanagement-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/servicemanagement.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-network # {"$kpt-set":"admin-network-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/compute.networkAdmin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-cloudbuild # {"$kpt-set":"admin-cloudbuild-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/cloudbuild.builds.editor - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-viewer # {"$kpt-set":"admin-viewer-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/viewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-storage # {"$kpt-set":"admin-storage-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/storage.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-bigquery # {"$kpt-set":"admin-bigquery-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/bigquery.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-dataflow # {"$kpt-set":"admin-dataflow-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/dataflow.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-ml # {"$kpt-set":"admin-ml-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/ml.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-dataproc # {"$kpt-set":"admin-dataproc-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/dataproc.editor - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-cloudsql # {"$kpt-set":"admin-cloudsql-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/cloudsql.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-logging # {"$kpt-set":"admin-logging-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/logging.logWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-metricwriter # {"$kpt-set":"admin-metricwriter-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/monitoring.metricWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-monitoringviewer # {"$kpt-set":"admin-monitoringviewer-iam"} -spec: - member: serviceAccount:testKptName-admin@customerProject.iam.gserviceaccount.com # {"$kpt-set":"admin-service-account"} - role: roles/monitoring.viewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-sa.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-sa.yaml deleted file mode 100644 index 7c02dbdee2..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-sa.yaml +++ /dev/null @@ -1,20 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMServiceAccount -metadata: - name: testKptName-admin # {"$kpt-set":"admin-sa-name"} -spec: - displayName: kubeflow admin service account diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-workload-identity-bindings.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-workload-identity-bindings.yaml deleted file mode 100644 index e4fd7491da..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-admin-workload-identity-bindings.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-workload-identity-user # {"$kpt-set":"name-admin-wi"} -spec: - member: serviceAccount:customerProject.svc.id.goog[kubeflow/profiles-controller-service-account] # {"$kpt-set":"admin-profiles-sa-wi"} - role: roles/iam.workloadIdentityUser - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-admin # {"$kpt-set":"admin-sa-name"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-kubeflow-wi # {"$kpt-set":"name-admin-kubeflow-wi"} -spec: - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-admin # {"$kpt-set":"admin-sa-name"} - member: serviceAccount:customerProject.svc.id.goog[kubeflow/kf-admin] # {"$kpt-set":"iampolicy-member-kfadmin-kubeflow"} - role: roles/iam.workloadIdentityUser ---- -# kf-admin binding in namespace istio-system -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-admin-istio-wi # {"$kpt-set":"name-admin-istio-wi"} -spec: - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-admin # {"$kpt-set":"admin-sa-name"} - member: serviceAccount:customerProject.svc.id.goog[istio-system/kf-admin] # {"$kpt-set":"iampolicy-member-kfadmin-istio-system"} - role: roles/iam.workloadIdentityUser diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-policy.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-policy.yaml deleted file mode 100644 index f76c456665..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-policy.yaml +++ /dev/null @@ -1,143 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-cloudbuild # {"$kpt-set":"name-user-cloudbuild"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/cloudbuild.builds.editor - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-viewer # {"$kpt-set":"name-user-viewer"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/viewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-source # {"$kpt-set":"name-user-source"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/source.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-storage # {"$kpt-set":"name-user-storage"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/storage.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-bigquery # {"$kpt-set":"name-user-bigquery"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/bigquery.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-dataflow # {"$kpt-set":"name-user-dataflow"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/dataflow.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-ml # {"$kpt-set":"name-user-ml"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/ml.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-dataproc # {"$kpt-set":"name-user-dataproc"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/dataproc.editor - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-cloudsql # {"$kpt-set":"name-user-cloudsql"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/cloudsql.admin - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-logging # {"$kpt-set":"name-user-logging"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/logging.logWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-metricwriter # {"$kpt-set":"name-user-metricwriter"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/monitoring.metricWriter - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-monitoringviewer # {"$kpt-set":"name-user-monitoringviewer"} -spec: - member: serviceAccount:testKptName-user@customerProject.iam.gserviceaccount.com # {"$kpt-set":"user-service-account"} - role: roles/monitoring.viewer - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Project - external: projects/customerProject # {"$kpt-set":"projects"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-sa.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-sa.yaml deleted file mode 100644 index 146e983c2b..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-sa.yaml +++ /dev/null @@ -1,20 +0,0 @@ -# Copyright 2020 Google LLC -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMServiceAccount -metadata: - name: testKptName-user # {"$kpt-set":"user-sa-name"} -spec: - displayName: kubeflow user service account diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-workload-identity-bindings.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-workload-identity-bindings.yaml deleted file mode 100644 index 53718bb237..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kf-user-workload-identity-bindings.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-workload-identity-user-ml-pipeline-ui # {"$kpt-set":"user-wi-ml-pipeline-ui"} -spec: - member: serviceAccount:customerProject.svc.id.goog[kubeflow/ml-pipeline-ui] # {"$kpt-set":"name-user-workload-identity-user-ml-pipeline-ui-member"} - role: roles/iam.workloadIdentityUser - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-user # {"$kpt-set":"user-sa-name"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-workload-identity-user-ml-pipeline-visualizationserver # {"$kpt-set":"user-wi-ml-pipeline-visualizationserver"} -spec: - member: serviceAccount:customerProject.svc.id.goog[kubeflow/ml-pipeline-visualizationserver] # {"$kpt-set":"name-user-workload-identity-user-ml-pipeline-visualizationserver-member"} - role: roles/iam.workloadIdentityUser - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-user # {"$kpt-set":"user-sa-name"} ---- -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: testKptName-user-workload-identity-user-pipeline-runner # {"$kpt-set":"user-wi-pipeline-runner"} -spec: - member: serviceAccount:customerProject.svc.id.goog[kubeflow/pipeline-runner] # {"$kpt-set":"name-user-workload-identity-user-pipeline-runner-member"} - role: roles/iam.workloadIdentityUser - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1beta1 - kind: IAMServiceAccount - name: testKptName-user # {"$kpt-set":"user-sa-name"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kustomization.yaml deleted file mode 100644 index e01367781e..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/iam/kustomization.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- kf-admin-policy.yaml -- kf-admin-sa.yaml -- kf-user-policy.yaml -- kf-user-sa.yaml -- kf-admin-workload-identity-bindings.yaml -- kf-user-workload-identity-bindings.yaml -- admin-manages-user-policy.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/compute-address.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/compute-address.yaml deleted file mode 100644 index 46ec9baedf..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/compute-address.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeAddress -metadata: - name: testKptName-ip # {"$kpt-set":"name-ip"} - labels: - label-one: "value-one" -spec: - addressType: EXTERNAL - description: Static IP for Kubeflow ingress. - location: global - ipVersion: IPV4 diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/kustomization.yaml deleted file mode 100644 index 5a26993b8d..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/ingress/kustomization.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- compute-address.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/kustomization.yaml deleted file mode 100644 index 60464d4ab3..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/kustomization.yaml +++ /dev/null @@ -1,8 +0,0 @@ -# This kustomize package defines CNRM resources to create the GCP resources needed -# to deploy Kubeflow. -resources: -- cluster -- ingress -- iam -- pipelines -- gcp-services.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/disk.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/disk.yaml deleted file mode 100644 index 99ef97c054..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/disk.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeDisk -metadata: - name: testKptName-storage-metadata-store # {"$kpt-set":"name-storage-metadata-store"} -spec: - location: testLocation # {"$kpt-set":"location"} - size: 20 ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeDisk -metadata: - name: testKptName-storage-artifact-store # {"$kpt-set":"name-storage-artifact-store"} -spec: - location: testLocation # {"$kpt-set":"location"} - size: 200 diff --git a/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/kustomization.yaml deleted file mode 100644 index dd4220b86a..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/cnrm/pipelines/kustomization.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- disk.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/README.md b/tests/testdata_gcp_kpt/gcp/v2/management/cluster/README.md deleted file mode 100644 index d169ee384d..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/README.md +++ /dev/null @@ -1,2 +0,0 @@ -Configuration for the cluster; a basic GKE cluster with workload -identity. diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/cluster.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cluster/cluster.yaml deleted file mode 100644 index ac83d97dd5..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/cluster.yaml +++ /dev/null @@ -1,26 +0,0 @@ -# TODO(jlewi): Do we still need IdentityNamespace? Isn't it automatically set for each project -apiVersion: identity.cnrm.cloud.google.com/v1alpha2 -kind: IdentityNamespace -metadata: - name: default -spec: {} ---- -# TODO(jlewi): Use a regional cluster? There should no longer be any cost savings to using zonal -# -# User specific values should be defined in a patch inside the blueprint package. -# Exception is the name since that needs to be changed in teh base package as well. -apiVersion: container.cnrm.cloud.google.com/v1alpha2 -kind: ContainerCluster -metadata: - name: testKptName # {"$kpt-set":"name"} -spec: - # Use a regional cluster. Regional offer higher availability and the cluster management fee is the same. - location: us-central1-f # {"$kpt-set":"mgmt-location"} - workloadIdentity: - identityNamespace: default - ipAllocationPolicy: - useIpAliases: true - releaseChannel: - channel: stable - clusterTelemetry: - type: enabled diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/enable-services.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cluster/enable-services.yaml deleted file mode 100644 index 481674ad3c..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/enable-services.yaml +++ /dev/null @@ -1,7 +0,0 @@ -# GKE -apiVersion: cnrm.cloud.google.com/v1alpha1 -kind: CloudService -metadata: - name: gke -spec: - service: container.googleapis.com diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cluster/kustomization.yaml deleted file mode 100644 index 9a542b0f08..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/kustomization.yaml +++ /dev/null @@ -1,4 +0,0 @@ -resources: -- enable-services.yaml -- cluster.yaml -- nodepool.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/nodepool.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cluster/nodepool.yaml deleted file mode 100644 index 27520dbd61..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cluster/nodepool.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: container.cnrm.cloud.google.com/v1alpha2 -kind: ContainerNodePool -metadata: - clusterName: "mgmt-project-id/us-central1-f/testMgmtName" # {"$kpt-set":"mgmt-cluster-name"} - name: testMgmtName-pool # {"$kpt-set":"mgmt-pool"} -spec: - autoscaling: - minNodeCount: 1 - maxNodeCount: 3 - nodeConfig: - diskSizeGb: 100 - diskType: pd-standard - machineType: n1-standard-4 - preemptible: false - oauthScopes: - - https://www.googleapis.com/auth/devstorage.read_only - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring - - https://www.googleapis.com/auth/servicecontrol - - https://www.googleapis.com/auth/service.management.readonly - - https://www.googleapis.com/auth/trace.append - metadata: - disable-legacy-endpoints: "true" - management: - autoRepair: true - autoUpgrade: true - clusterRef: - name: testKptName # {"$kpt-set":"name"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/README.md b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/README.md deleted file mode 100644 index d73d65b15a..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/README.md +++ /dev/null @@ -1,12 +0,0 @@ -# Configuration for installing KCC in the management cluster. - -Configs are a copy of the CNRM install (see [docs](https://cloud.google.com/config-connector/docs/how-to/install-upgrade-uninstall#namespaced-mode)) - -To update: - -1. Download the the latest GCS install bundle listed on (https://cloud.google.com/config-connector/docs/how-to/install-upgrade-uninstall#namespaced-mode) - -1. Copy the system components for the namespaced install bundle to `install-system` -1. Copy the per namespace components to the template stored in the blueprint repo. - - * You will need to add kpt setters to the per namespace components. \ No newline at end of file diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/enable-services.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/enable-services.yaml deleted file mode 100644 index 6c93215720..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/enable-services.yaml +++ /dev/null @@ -1,8 +0,0 @@ -# cloudresourcemanager, used for creating projects -apiVersion: cnrm.cloud.google.com/v1alpha1 -kind: CloudService -metadata: - name: cloudresourcemanager.googleapis.com - namespace: "mgmt-project-id" # {"$kpt-set":"mgmt-project"} -spec: - service: cloudresourcemanager.googleapis.com diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/iam.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/iam.yaml deleted file mode 100644 index cf3377f42e..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/iam.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: iam.cnrm.cloud.google.com/v1alpha1 -kind: IAMServiceAccount -metadata: - name: cnrm-controller-manager -spec: - displayName: Service Account for CNRM - projectRoles: - - roles/source.reader ---- -apiVersion: iam.cnrm.cloud.google.com/v1alpha1 -kind: IAMPolicy -metadata: - name: cnrm-controller-manager -spec: - resourceRef: - apiVersion: iam.cnrm.cloud.google.com/v1alpha1 - kind: IAMServiceAccount - name: cnrm-controller-manager - bindings: - - role: roles/iam.workloadIdentityUser - members: - - serviceAccount:root-270714.svc.id.goog[cnrm-system/cnrm-controller-manager] ---- -# TODO(jlewi): Should we scope this to a folder not an organization and -# create an appropriate setter -apiVersion: iam.cnrm.cloud.google.com/v1beta1 -kind: IAMPolicyMember -metadata: - name: cnrm-controller-manager:project -spec: - member: serviceAccount:cnrm-controller-manager@root-270714.iam.gserviceaccount.com - role: roles/resourcemanager.projectCreator - resourceRef: - apiVersion: resourcemanager.cnrm.cloud.google.com/v1beta1 - kind: Organization - external: organizations/190265346736 diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/0-cnrm-system.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/0-cnrm-system.yaml deleted file mode 100644 index 83c80458d4..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/0-cnrm-system.yaml +++ /dev/null @@ -1,581 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-system ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-deletiondefender - namespace: cnrm-system ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-resource-stats-recorder - namespace: cnrm-system ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-webhook-manager - namespace: cnrm-system ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-admin -rules: -- apiGroups: - - accesscontextmanager.cnrm.cloud.google.com - - bigquery.cnrm.cloud.google.com - - bigtable.cnrm.cloud.google.com - - cloudbuild.cnrm.cloud.google.com - - compute.cnrm.cloud.google.com - - container.cnrm.cloud.google.com - - dataflow.cnrm.cloud.google.com - - dns.cnrm.cloud.google.com - - firestore.cnrm.cloud.google.com - - iam.cnrm.cloud.google.com - - kms.cnrm.cloud.google.com - - pubsub.cnrm.cloud.google.com - - redis.cnrm.cloud.google.com - - resourcemanager.cnrm.cloud.google.com - - servicenetworking.cnrm.cloud.google.com - - serviceusage.cnrm.cloud.google.com - - sourcerepo.cnrm.cloud.google.com - - spanner.cnrm.cloud.google.com - - sql.cnrm.cloud.google.com - - storage.cnrm.cloud.google.com - resources: - - '*' - verbs: - - get - - list - - watch - - create - - update - - patch - - delete ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-deletiondefender-role -rules: -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - services - verbs: - - get - - list - - watch - - create - - update - - patch - - delete ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-manager-cluster-role -rules: -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - core.cnrm.cloud.google.com - resources: - - servicemappings - verbs: - - get - - list - - watch -- apiGroups: - - core.cnrm.cloud.google.com - resources: - - '*' - verbs: - - get - - list - - watch - - create - - update - - patch - - delete ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-manager-ns-role -rules: -- apiGroups: - - "" - resources: - - events - - configmaps - - secrets - - services - verbs: - - get - - list - - watch - - create - - update - - patch - - delete ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-recorder-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - create - - update - - patch - - delete ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-webhook-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - core.cnrm.cloud.google.com - resources: - - servicemappings - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - services - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-admin-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cnrm-admin -subjects: -- kind: ServiceAccount - name: cnrm-resource-stats-recorder - namespace: cnrm-system -- kind: ServiceAccount - name: cnrm-deletiondefender - namespace: cnrm-system ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-deletiondefender-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cnrm-deletiondefender-role -subjects: -- kind: ServiceAccount - name: cnrm-deletiondefender - namespace: cnrm-system ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-recorder-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cnrm-recorder-role -subjects: -- kind: ServiceAccount - name: cnrm-resource-stats-recorder - namespace: cnrm-system ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-webhook-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cnrm-webhook-role -subjects: -- kind: ServiceAccount - name: cnrm-webhook-manager - namespace: cnrm-system ---- -apiVersion: v1 -kind: Service -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/system: "true" - name: cnrm-deletiondefender - namespace: cnrm-system -spec: - ports: - - name: deletiondefender - port: 443 - selector: - cnrm.cloud.google.com/component: cnrm-deletiondefender - cnrm.cloud.google.com/system: "true" ---- -apiVersion: v1 -kind: Service -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - prometheus.io/port: "8888" - prometheus.io/scrape: "true" - labels: - cnrm.cloud.google.com/monitored: "true" - cnrm.cloud.google.com/system: "true" - name: cnrm-resource-stats-recorder-service - namespace: cnrm-system -spec: - ports: - - name: metrics - port: 8888 - selector: - cnrm.cloud.google.com/component: cnrm-resource-stats-recorder - cnrm.cloud.google.com/system: "true" ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-resource-stats-recorder - cnrm.cloud.google.com/system: "true" - name: cnrm-resource-stats-recorder - namespace: cnrm-system -spec: - replicas: 1 - selector: - matchLabels: - cnrm.cloud.google.com/component: cnrm-resource-stats-recorder - cnrm.cloud.google.com/system: "true" - template: - metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-resource-stats-recorder - cnrm.cloud.google.com/system: "true" - spec: - containers: - - args: - - --prometheus-scrape-endpoint=:8888 - - --metric-interval=60 - command: - - /configconnector/recorder - env: - - name: CONFIG_CONNECTOR_VERSION - value: 1.7.1 - image: gcr.io/cnrm-eap/recorder:f190973 - imagePullPolicy: Always - name: recorder - readinessProbe: - exec: - command: - - cat - - /tmp/ready - initialDelaySeconds: 3 - periodSeconds: 3 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 50m - memory: 64Mi - securityContext: - privileged: false - runAsNonRoot: true - runAsUser: 1000 - serviceAccountName: cnrm-resource-stats-recorder - terminationGracePeriodSeconds: 10 ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-webhook-manager - cnrm.cloud.google.com/system: "true" - name: cnrm-webhook-manager - namespace: cnrm-system -spec: - replicas: 1 - selector: - matchLabels: - cnrm.cloud.google.com/component: cnrm-webhook-manager - cnrm.cloud.google.com/system: "true" - template: - metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-webhook-manager - cnrm.cloud.google.com/system: "true" - spec: - containers: - - args: - - --stderrthreshold=INFO - command: - - /configconnector/webhook - env: - - name: NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/cnrm-eap/webhook:f190973 - imagePullPolicy: Always - name: webhook - readinessProbe: - exec: - command: - - cat - - /tmp/ready - initialDelaySeconds: 3 - periodSeconds: 3 - resources: - limits: - cpu: 100m - memory: 256Mi - requests: - cpu: 100m - memory: 128Mi - securityContext: - privileged: false - runAsNonRoot: true - runAsUser: 1000 - serviceAccountName: cnrm-webhook-manager - terminationGracePeriodSeconds: 10 ---- -apiVersion: apps/v1 -kind: StatefulSet -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-deletiondefender - cnrm.cloud.google.com/system: "true" - name: cnrm-deletiondefender - namespace: cnrm-system -spec: - selector: - matchLabels: - cnrm.cloud.google.com/component: cnrm-deletiondefender - cnrm.cloud.google.com/system: "true" - serviceName: cnrm-deletiondefender - template: - metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - labels: - cnrm.cloud.google.com/component: cnrm-deletiondefender - cnrm.cloud.google.com/system: "true" - spec: - containers: - - args: - - --stderrthreshold=INFO - command: - - /configconnector/deletiondefender - image: gcr.io/cnrm-eap/deletiondefender:f190973 - imagePullPolicy: Always - name: deletiondefender - readinessProbe: - exec: - command: - - cat - - /tmp/ready - initialDelaySeconds: 3 - periodSeconds: 3 - resources: - limits: - cpu: 100m - memory: 256Mi - requests: - cpu: 100m - memory: 128Mi - securityContext: - privileged: false - runAsNonRoot: true - runAsUser: 1000 - serviceAccountName: cnrm-deletiondefender - terminationGracePeriodSeconds: 10 diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/crds.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/crds.yaml deleted file mode 100644 index d5d73b0c2f..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/crds.yaml +++ /dev/null @@ -1,3321 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: accesscontextmanageraccesslevels.accesscontextmanager.cnrm.cloud.google.com -spec: - group: accesscontextmanager.cnrm.cloud.google.com - names: - categories: - - gcp - kind: AccessContextManagerAccessLevel - plural: accesscontextmanageraccesslevels - shortNames: - - gcpaccesscontextmanageraccesslevel - - gcpaccesscontextmanageraccesslevels - singular: accesscontextmanageraccesslevel - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - accessPolicyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - basic: - description: A set of predefined conditions for the access level and - a combining function. - properties: - combiningFunction: - description: |- - How the conditions list should be combined to determine if a request - is granted this AccessLevel. If AND is used, each Condition in - conditions must be satisfied for the AccessLevel to be applied. If - OR is used, at least one Condition in conditions must be satisfied - for the AccessLevel to be applied. Defaults to AND if unspecified. - type: string - conditions: - description: A set of requirements for the AccessLevel to be granted. - items: - properties: - devicePolicy: - description: |- - Device specific restrictions, all restrictions must hold for - the Condition to be true. If not specified, all devices are - allowed. - properties: - allowedDeviceManagementLevels: - description: |- - A list of allowed device management levels. - An empty list allows all management levels. - items: - type: string - type: array - allowedEncryptionStatuses: - description: |- - A list of allowed encryptions statuses. - An empty list allows all statuses. - items: - type: string - type: array - osConstraints: - description: |- - A list of allowed OS versions. - An empty list allows all types and all versions. - items: - properties: - minimumVersion: - description: |- - The minimum allowed OS version. If not set, any version - of this OS satisfies the constraint. - Format: "major.minor.patch" such as "10.5.301", "9.2.1". - type: string - osType: - description: The operating system type of the device. - type: string - required: - - osType - type: object - type: array - requireAdminApproval: - description: Whether the device needs to be approved by - the customer admin. - type: boolean - requireCorpOwned: - description: Whether the device needs to be corp owned. - type: boolean - requireScreenLock: - description: |- - Whether or not screenlock is required for the DevicePolicy - to be true. Defaults to false. - type: boolean - type: object - ipSubnetworks: - description: |- - A list of CIDR block IP subnetwork specification. May be IPv4 - or IPv6. - Note that for a CIDR IP address block, the specified IP address - portion must be properly truncated (i.e. all the host bits must - be zero) or the input is considered malformed. For example, - "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly, - for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" - is not. The originating IP of a request must be in one of the - listed subnets in order for this Condition to be true. - If empty, all IP addresses are allowed. - items: - type: string - type: array - members: - items: - properties: - group: - type: string - serviceAccountRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - user: - type: string - type: object - type: array - negate: - description: |- - Whether to negate the Condition. If true, the Condition becomes - a NAND over its non-empty fields, each field must be false for - the Condition overall to be satisfied. Defaults to false. - type: boolean - requiredAccessLevels: - items: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: array - type: object - type: array - required: - - conditions - type: object - description: - description: Description of the AccessLevel and its use. Does not affect - behavior. - type: string - title: - description: Human readable title. Must be unique within the Policy. - type: string - required: - - accessPolicyRef - - title - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: accesscontextmanageraccesspolicies.accesscontextmanager.cnrm.cloud.google.com -spec: - group: accesscontextmanager.cnrm.cloud.google.com - names: - categories: - - gcp - kind: AccessContextManagerAccessPolicy - plural: accesscontextmanageraccesspolicies - shortNames: - - gcpaccesscontextmanageraccesspolicy - - gcpaccesscontextmanageraccesspolicies - singular: accesscontextmanageraccesspolicy - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - title: - description: Human readable title. Does not affect behavior. - type: string - required: - - title - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - createTime: - description: Time the AccessPolicy was created in UTC. - type: string - name: - description: 'Resource name of the AccessPolicy. Format: {policy_id}' - type: string - updateTime: - description: Time the AccessPolicy was updated in UTC. - type: string - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: bigquerydatasets.bigquery.cnrm.cloud.google.com -spec: - group: bigquery.cnrm.cloud.google.com - names: - categories: - - gcp - kind: BigQueryDataset - plural: bigquerydatasets - shortNames: - - gcpbigquerydataset - - gcpbigquerydatasets - singular: bigquerydataset - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - access: - description: An array of objects that define dataset access for one - or more entities. - items: - properties: - domain: - description: |- - A domain to grant access to. Any users signed in with the - domain specified will be granted the specified access - type: string - groupByEmail: - description: An email address of a Google Group to grant access - to. - type: string - role: - description: |- - Describes the rights granted to the user specified by the other - member of the access object. Primitive, Predefined and custom - roles are supported. Predefined roles that have equivalent - primitive roles are swapped by the API to their Primitive - counterparts, and will show a diff post-create. See - [official docs](https://cloud.google.com/bigquery/docs/access-control). - type: string - specialGroup: - description: |- - A special group to grant access to. Possible values include: - - - * 'projectOwners': Owners of the enclosing project. - - - * 'projectReaders': Readers of the enclosing project. - - - * 'projectWriters': Writers of the enclosing project. - - - * 'allAuthenticatedUsers': All authenticated BigQuery users. - type: string - userByEmail: - description: |- - An email address of a user to grant access to. For example: - fred@example.com - type: string - view: - description: |- - A view from a different dataset to grant access to. Queries - executed against that view will have read access to tables in - this dataset. The role field is not required when this field is - set. If that view is updated by any user, access to the view - needs to be granted again via an update operation. - properties: - datasetId: - description: The ID of the dataset containing this table. - type: string - projectId: - description: The ID of the project containing this table. - type: string - tableId: - description: |- - The ID of the table. The ID must contain only letters (a-z, - A-Z), numbers (0-9), or underscores (_). The maximum length - is 1,024 characters. - type: string - required: - - datasetId - - projectId - - tableId - type: object - type: object - type: array - defaultEncryptionConfiguration: - description: |- - The default encryption key for all tables in the dataset. Once this property is set, - all newly-created partitioned tables in the dataset will have encryption key set to - this value, unless table creation request (or query) overrides the key. - properties: - kmsKeyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - required: - - kmsKeyRef - type: object - defaultPartitionExpirationMs: - description: |- - The default partition expiration for all partitioned tables in - the dataset, in milliseconds. - - - Once this property is set, all newly-created partitioned tables in - the dataset will have an 'expirationMs' property in the 'timePartitioning' - settings set to this value, and changing the value will only - affect new tables, not existing ones. The storage in a partition will - have an expiration time of its partition time plus this value. - Setting this property overrides the use of 'defaultTableExpirationMs' - for partitioned tables: only one of 'defaultTableExpirationMs' and - 'defaultPartitionExpirationMs' will be used for any new partitioned - table. If you provide an explicit 'timePartitioning.expirationMs' when - creating or updating a partitioned table, that value takes precedence - over the default partition expiration time indicated by this property. - type: integer - defaultTableExpirationMs: - description: |- - The default lifetime of all tables in the dataset, in milliseconds. - The minimum value is 3600000 milliseconds (one hour). - - - Once this property is set, all newly-created tables in the dataset - will have an 'expirationTime' property set to the creation time plus - the value in this property, and changing the value will only affect - new tables, not existing ones. When the 'expirationTime' for a given - table is reached, that table will be deleted automatically. - If a table's 'expirationTime' is modified or removed before the - table expires, or if you provide an explicit 'expirationTime' when - creating a table, that value takes precedence over the default - expiration time indicated by this property. - type: integer - description: - description: A user-friendly description of the dataset - type: string - friendlyName: - description: A descriptive name for the dataset - type: string - location: - description: |- - The geographic location where the dataset should reside. - See [official docs](https://cloud.google.com/bigquery/docs/dataset-locations). - - - There are two types of locations, regional or multi-regional. A regional - location is a specific geographic place, such as Tokyo, and a multi-regional - location is a large geographic area, such as the United States, that - contains at least two geographic places. - - - Possible regional values include: 'asia-east1', 'asia-northeast1', - 'asia-southeast1', 'australia-southeast1', 'europe-north1', - 'europe-west2' and 'us-east4'. - - - Possible multi-regional values: 'EU' and 'US'. - - - The default value is multi-regional location 'US'. - Changing this forces a new resource to be created. - type: string - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTime: - description: |- - The time when this dataset was created, in milliseconds since the - epoch. - type: integer - etag: - description: A hash of the resource. - type: string - lastModifiedTime: - description: |- - The date when this dataset or any of its tables was last modified, in - milliseconds since the epoch. - type: integer - selfLink: - type: string - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: bigquerytables.bigquery.cnrm.cloud.google.com -spec: - group: bigquery.cnrm.cloud.google.com - names: - categories: - - gcp - kind: BigQueryTable - plural: bigquerytables - shortNames: - - gcpbigquerytable - - gcpbigquerytables - singular: bigquerytable - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - clustering: - items: - type: string - type: array - datasetRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - description: - type: string - encryptionConfiguration: - properties: - kmsKeyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - required: - - kmsKeyRef - type: object - expirationTime: - type: integer - externalDataConfiguration: - properties: - autodetect: - type: boolean - compression: - type: string - csvOptions: - properties: - allowJaggedRows: - type: boolean - allowQuotedNewlines: - type: boolean - encoding: - type: string - fieldDelimiter: - type: string - quote: - type: string - skipLeadingRows: - type: integer - required: - - quote - type: object - googleSheetsOptions: - properties: - range: - type: string - skipLeadingRows: - type: integer - type: object - ignoreUnknownValues: - type: boolean - maxBadRecords: - type: integer - sourceFormat: - type: string - sourceUris: - items: - type: string - type: array - required: - - autodetect - - sourceFormat - - sourceUris - type: object - friendlyName: - type: string - schema: - type: string - timePartitioning: - properties: - expirationMs: - type: integer - field: - type: string - requirePartitionFilter: - type: boolean - type: - type: string - required: - - type - type: object - view: - properties: - query: - type: string - useLegacySql: - type: boolean - required: - - query - type: object - required: - - datasetRef - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTime: - type: integer - etag: - type: string - lastModifiedTime: - type: integer - location: - type: string - numBytes: - type: integer - numLongTermBytes: - type: integer - numRows: - type: integer - selfLink: - type: string - type: - type: string - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: bigtableinstances.bigtable.cnrm.cloud.google.com -spec: - group: bigtable.cnrm.cloud.google.com - names: - categories: - - gcp - kind: BigtableInstance - plural: bigtableinstances - shortNames: - - gcpbigtableinstance - - gcpbigtableinstances - singular: bigtableinstance - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - cluster: - items: - properties: - clusterId: - type: string - numNodes: - type: integer - storageType: - type: string - zone: - type: string - required: - - clusterId - - zone - type: object - type: array - displayName: - type: string - instanceType: - type: string - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: cloudbuildtriggers.cloudbuild.cnrm.cloud.google.com -spec: - group: cloudbuild.cnrm.cloud.google.com - names: - categories: - - gcp - kind: CloudBuildTrigger - plural: cloudbuildtriggers - shortNames: - - gcpcloudbuildtrigger - - gcpcloudbuildtriggers - singular: cloudbuildtrigger - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - build: - description: Contents of the build template. Either a filename or build - template must be provided. - properties: - images: - description: |- - A list of images to be pushed upon the successful completion of all build steps. - The images are pushed using the builder service account's credentials. - The digests of the pushed images will be stored in the Build resource's results field. - If any of the images fail to be pushed, the build status is marked FAILURE. - items: - type: string - type: array - step: - description: The operations to be performed on the workspace. - items: - properties: - args: - description: |- - A list of arguments that will be presented to the step when it is started. - - If the image used to run the step's container has an entrypoint, the args - are used as arguments to that entrypoint. If the image does not define an - entrypoint, the first element in args is used as the entrypoint, and the - remainder will be used as arguments. - items: - type: string - type: array - dir: - description: |- - Working directory to use when running this step's container. - - If this value is a relative path, it is relative to the build's working - directory. If this value is absolute, it may be outside the build's working - directory, in which case the contents of the path may not be persisted - across build step executions, unless a 'volume' for that path is specified. - - If the build specifies a 'RepoSource' with 'dir' and a step with a - 'dir', - which specifies an absolute path, the 'RepoSource' 'dir' is ignored - for the step's execution. - type: string - entrypoint: - description: |- - Entrypoint to be used instead of the build step image's - default entrypoint. - If unset, the image's default entrypoint is used - type: string - env: - description: |- - A list of environment variable definitions to be used when - running a step. - - The elements are of the form "KEY=VALUE" for the environment variable - "KEY" being given the value "VALUE". - items: - type: string - type: array - id: - description: |- - Unique identifier for this build step, used in 'wait_for' to - reference this build step as a dependency. - type: string - name: - description: |- - The name of the container image that will run this particular build step. - - If the image is available in the host's Docker daemon's cache, it will be - run directly. If not, the host will attempt to pull the image first, using - the builder service account's credentials if necessary. - - The Docker daemon's cache will already have the latest versions of all of - the officially supported build steps (https://github.com/GoogleCloudPlatform/cloud-builders). - The Docker daemon will also have cached many of the layers for some popular - images, like "ubuntu", "debian", but they will be refreshed at the time - you attempt to use them. - - If you built an image in a previous build step, it will be stored in the - host's Docker daemon's cache and is available to use as the name for a - later build step. - type: string - secretEnv: - description: |- - A list of environment variables which are encrypted using - a Cloud Key - Management Service crypto key. These values must be specified in - the build's 'Secret'. - items: - type: string - type: array - timeout: - description: |- - Time limit for executing this build step. If not defined, - the step has no - time limit and will be allowed to continue to run until either it - completes or the build itself times out. - type: string - timing: - description: |- - Output only. Stores timing information for executing this - build step. - type: string - volumes: - description: |- - List of volumes to mount into the build step. - - Each volume is created as an empty volume prior to execution of the - build step. Upon completion of the build, volumes and their contents - are discarded. - - Using a named volume in only one step is not valid as it is - indicative of a build request with an incorrect configuration. - items: - properties: - name: - description: |- - Name of the volume to mount. - - Volume names must be unique per build step and must be valid names for - Docker volumes. Each named volume must be used by at least two build steps. - type: string - path: - description: |- - Path at which to mount the volume. - - Paths must be absolute and cannot conflict with other volume paths on - the same build step or with certain reserved volume paths. - type: string - required: - - testKptName # {"$kpt-set":"name"} - - path - type: object - type: array - waitFor: - description: |- - The ID(s) of the step(s) that this build step depends on. - - This build step will not start until all the build steps in 'wait_for' - have completed successfully. If 'wait_for' is empty, this build step - will start when all previous build steps in the 'Build.Steps' list - have completed successfully. - items: - type: string - type: array - required: - - testKptName # {"$kpt-set":"name"} - type: object - type: array - tags: - description: Tags for annotation of a Build. These are not docker - tags. - items: - type: string - type: array - timeout: - description: |- - Amount of time that this build should be allowed to run, to second granularity. - If this amount of time elapses, work on the build will cease and the build status will be TIMEOUT. - This timeout must be equal to or greater than the sum of the timeouts for build steps within the build. - The expected format is the number of seconds followed by s. - Default time is ten minutes (600s). - type: string - required: - - step - type: object - description: - description: Human-readable description of the trigger. - type: string - disabled: - description: Whether the trigger is disabled or not. If true, the trigger - will never result in a build. - type: boolean - filename: - description: Path, from the source root, to a file whose contents is - used for the template. Either a filename or build template must be - provided. - type: string - github: - description: |- - Describes the configuration of a trigger that creates a build whenever a GitHub event is received. - - One of 'trigger_template' or 'github' must be provided. - properties: - name: - description: |- - Name of the repository. For example: The name for - https://github.com/googlecloudplatform/cloud-builders is "cloud-builders". - type: string - owner: - description: |- - Owner of the repository. For example: The owner for - https://github.com/googlecloudplatform/cloud-builders is "googlecloudplatform". - type: string - pullRequest: - description: filter to match changes in pull requests. Specify - only one of pullRequest or push. - properties: - branch: - description: Regex of branches to match. - type: string - commentControl: - description: Whether to block builds on a "/gcbrun" comment - from a repository owner or collaborator. - type: string - required: - - branch - type: object - push: - description: filter to match changes in refs, like branches or tags. Specify - only one of pullRequest or push. - properties: - branch: - description: Regex of branches to match. Specify only one of - branch or tag. - type: string - tag: - description: Regex of tags to match. Specify only one of branch - or tag. - type: string - type: object - type: object - ignoredFiles: - description: |- - ignoredFiles and includedFiles are file glob matches using http://godoc/pkg/path/filepath#Match - extended with support for '**'. - - If ignoredFiles and changed files are both empty, then they are not - used to determine whether or not to trigger a build. - - If ignoredFiles is not empty, then we ignore any files that match any - of the ignored_file globs. If the change has no files that are outside - of the ignoredFiles globs, then we do not trigger a build. - items: - type: string - type: array - includedFiles: - description: |- - ignoredFiles and includedFiles are file glob matches using http://godoc/pkg/path/filepath#Match - extended with support for '**'. - - If any of the files altered in the commit pass the ignoredFiles filter - and includedFiles is empty, then as far as this filter is concerned, we - should trigger the build. - - If any of the files altered in the commit pass the ignoredFiles filter - and includedFiles is not empty, then we make sure that at least one of - those files matches a includedFiles glob. If not, then we do not trigger - a build. - items: - type: string - type: array - substitutions: - additionalProperties: - type: string - description: Substitutions data for Build resource. - type: object - triggerTemplate: - description: |- - Template describing the types of source changes to trigger a build. - - Branch and tag names in trigger templates are interpreted as regular - expressions. Any branch or tag change that matches that regular - expression will trigger a build. - - One of 'trigger_template' or 'github' must be provided. - properties: - branchName: - description: |- - Name of the branch to build. Exactly one a of branch name, tag, or commit SHA must be provided. - This field is a regular expression. - type: string - commitSha: - description: Explicit commit SHA to build. Exactly one of a branch - name, tag, or commit SHA must be provided. - type: string - dir: - description: |- - Directory, relative to the source root, in which to run the build. - - This must be a relative path. If a step's dir is specified and - is an absolute path, this value is ignored for that step's - execution. - type: string - repoRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - tagName: - description: |- - Name of the tag to build. Exactly one of a branch name, tag, or commit SHA must be provided. - This field is a regular expression. - type: string - type: object - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - createTime: - description: Time when the trigger was created. - type: string - triggerId: - description: The unique identifier for the trigger. - type: string - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computeaddresses.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeAddress - plural: computeaddresses - shortNames: - - gcpcomputeaddress - - gcpcomputeaddresses - singular: computeaddress - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - address: - description: |- - The static external IP address represented by this resource. Only - IPv4 is supported. An address may only be specified for INTERNAL - address types. The IP address must be inside the specified subnetwork, - if any. - type: string - addressType: - description: |- - The type of address to reserve, either INTERNAL or EXTERNAL. - If unspecified, defaults to EXTERNAL. - type: string - description: - description: An optional description of this resource. - type: string - ipVersion: - description: |- - The IP Version that will be used by this address. Valid options are - 'IPV4' or 'IPV6'. The default value is 'IPV4'. - type: string - location: - description: 'Location represents the geographical location of the ComputeAddress. - Specify a region name or "global" for global resources. Reference: - GCP definition of regions/zones (https://cloud.google.com/compute/docs/regions-zones/)' - type: string - networkRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - networkTier: - description: |- - The networking tier used for configuring this address. This field can - take the following values: PREMIUM or STANDARD. If this field is not - specified, it is assumed to be PREMIUM. - type: string - prefixLength: - description: |- - The prefix length of the IP range. If not present, it means the - address field is a single IP address. - - This field is not applicable to addresses with addressType=EXTERNAL. - type: integer - purpose: - description: |- - The purpose of this resource, which can be one of the following values: - - - GCE_ENDPOINT for addresses that are used by VM instances, alias IP ranges, internal load balancers, and similar resources. - - This should only be set when using an Internal address. - type: string - subnetworkRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - required: - - location - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTimestamp: - description: Creation timestamp in RFC3339 text format. - type: string - labelFingerprint: - description: |- - The fingerprint used for optimistic locking of this resource. Used - internally during updates. - type: string - selfLink: - type: string - users: - description: The URLs of the resources that are using this address. - items: - type: string - type: array - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computebackendbuckets.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeBackendBucket - plural: computebackendbuckets - shortNames: - - gcpcomputebackendbucket - - gcpcomputebackendbuckets - singular: computebackendbucket - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - bucketRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - cdnPolicy: - description: Cloud CDN configuration for this Backend Bucket. - properties: - signedUrlCacheMaxAgeSec: - description: |- - Maximum number of seconds the response to a signed URL request will - be considered fresh. After this time period, - the response will be revalidated before being served. - When serving responses to signed URL requests, - Cloud CDN will internally behave as though - all responses from this backend had a "Cache-Control: public, - max-age=[TTL]" header, regardless of any existing Cache-Control - header. The actual headers served in responses will not be altered. - type: integer - required: - - signedUrlCacheMaxAgeSec - type: object - description: - description: |- - An optional textual description of the resource; provided by the - client when the resource is created. - type: string - enableCdn: - description: If true, enable Cloud CDN for this BackendBucket. - type: boolean - required: - - bucketRef - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTimestamp: - description: Creation timestamp in RFC3339 text format. - type: string - selfLink: - type: string - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computebackendservices.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeBackendService - plural: computebackendservices - shortNames: - - gcpcomputebackendservice - - gcpcomputebackendservices - singular: computebackendservice - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - affinityCookieTtlSec: - description: |- - Lifetime of cookies in seconds if session_affinity is - GENERATED_COOKIE. If set to 0, the cookie is non-persistent and lasts - only until the end of the browser session (or equivalent). The - maximum allowed value for TTL is one day. - - When the load balancing scheme is INTERNAL, this field is not used. - type: integer - backend: - description: The set of backends that serve this BackendService. - items: - properties: - balancingMode: - description: |- - Specifies the balancing mode for this backend. - - For global HTTP(S) or TCP/SSL load balancing, the default is - UTILIZATION. Valid values are UTILIZATION, RATE (for HTTP(S)) - and CONNECTION (for TCP/SSL). - type: string - capacityScaler: - description: |- - A multiplier applied to the group's maximum servicing capacity - (based on UTILIZATION, RATE or CONNECTION). - - Default value is 1, which means the group will serve up to 100% - of its configured capacity (depending on balancingMode). A - setting of 0 means the group is completely drained, offering - 0% of its available Capacity. Valid range is [0.0,1.0]. - type: number - description: - description: |- - An optional description of this resource. - Provide this property when you create the resource. - type: string - group: - properties: - instanceGroupRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - networkEndpointGroupRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: object - maxConnections: - description: |- - The max number of simultaneous connections for the group. Can - be used with either CONNECTION or UTILIZATION balancing modes. - - For CONNECTION mode, either maxConnections or one - of maxConnectionsPerInstance or maxConnectionsPerEndpoint, - as appropriate for group type, must be set. - type: integer - maxConnectionsPerEndpoint: - description: |- - The max number of simultaneous connections that a single backend - network endpoint can handle. This is used to calculate the - capacity of the group. Can be used in either CONNECTION or - UTILIZATION balancing modes. - - For CONNECTION mode, either - maxConnections or maxConnectionsPerEndpoint must be set. - type: integer - maxConnectionsPerInstance: - description: |- - The max number of simultaneous connections that a single - backend instance can handle. This is used to calculate the - capacity of the group. Can be used in either CONNECTION or - UTILIZATION balancing modes. - - For CONNECTION mode, either maxConnections or - maxConnectionsPerInstance must be set. - type: integer - maxRate: - description: |- - The max requests per second (RPS) of the group. - - Can be used with either RATE or UTILIZATION balancing modes, - but required if RATE mode. For RATE mode, either maxRate or one - of maxRatePerInstance or maxRatePerEndpoint, as appropriate for - group type, must be set. - type: integer - maxRatePerEndpoint: - description: |- - The max requests per second (RPS) that a single backend network - endpoint can handle. This is used to calculate the capacity of - the group. Can be used in either balancing mode. For RATE mode, - either maxRate or maxRatePerEndpoint must be set. - type: number - maxRatePerInstance: - description: |- - The max requests per second (RPS) that a single backend - instance can handle. This is used to calculate the capacity of - the group. Can be used in either balancing mode. For RATE mode, - either maxRate or maxRatePerInstance must be set. - type: number - maxUtilization: - description: |- - Used when balancingMode is UTILIZATION. This ratio defines the - CPU utilization target for the group. The default is 0.8. Valid - range is [0.0, 1.0]. - type: number - required: - - group - type: object - type: array - cdnPolicy: - description: Cloud CDN configuration for this BackendService. - properties: - cacheKeyPolicy: - description: The CacheKeyPolicy for this CdnPolicy. - properties: - includeHost: - description: If true requests to different hosts will be cached - separately. - type: boolean - includeProtocol: - description: If true, http and https requests will be cached - separately. - type: boolean - includeQueryString: - description: |- - If true, include query string parameters in the cache key - according to query_string_whitelist and - query_string_blacklist. If neither is set, the entire query - string will be included. - - If false, the query string will be excluded from the cache - key entirely. - type: boolean - queryStringBlacklist: - description: |- - Names of query string parameters to exclude in cache keys. - - All other parameters will be included. Either specify - query_string_whitelist or query_string_blacklist, not both. - '&' and '=' will be percent encoded and not treated as - delimiters. - items: - type: string - type: array - queryStringWhitelist: - description: |- - Names of query string parameters to include in cache keys. - - All other parameters will be excluded. Either specify - query_string_whitelist or query_string_blacklist, not both. - '&' and '=' will be percent encoded and not treated as - delimiters. - items: - type: string - type: array - type: object - signedUrlCacheMaxAgeSec: - description: |- - Maximum number of seconds the response to a signed URL request - will be considered fresh, defaults to 1hr (3600s). After this - time period, the response will be revalidated before - being served. - - When serving responses to signed URL requests, Cloud CDN will - internally behave as though all responses from this backend had a - "Cache-Control: public, max-age=[TTL]" header, regardless of any - existing Cache-Control header. The actual headers served in - responses will not be altered. - type: integer - type: object - circuitBreakers: - description: |- - Settings controlling the volume of connections to a backend service. This field - is applicable only when the load_balancing_scheme is set to INTERNAL_SELF_MANAGED. - properties: - connectTimeout: - description: The timeout for new network connections to hosts. - properties: - nanos: - description: |- - Span of time that's a fraction of a second at nanosecond - resolution. Durations less than one second are represented - with a 0 seconds field and a positive nanos field. Must - be from 0 to 999,999,999 inclusive. - type: integer - seconds: - description: |- - Span of time at a resolution of a second. - Must be from 0 to 315,576,000,000 inclusive. - type: integer - required: - - seconds - type: object - maxConnections: - description: |- - The maximum number of connections to the backend cluster. - Defaults to 1024. - type: integer - maxPendingRequests: - description: |- - The maximum number of pending requests to the backend cluster. - Defaults to 1024. - type: integer - maxRequests: - description: |- - The maximum number of parallel requests to the backend cluster. - Defaults to 1024. - type: integer - maxRequestsPerConnection: - description: |- - Maximum requests for a single backend connection. This parameter - is respected by both the HTTP/1.1 and HTTP/2 implementations. If - not specified, there is no limit. Setting this parameter to 1 - will effectively disable keep alive. - type: integer - maxRetries: - description: |- - The maximum number of parallel retries to the backend cluster. - Defaults to 3. - type: integer - type: object - connectionDrainingTimeoutSec: - description: |- - Time for which instance will be drained (not accept new - connections, but still work to finish started). - type: integer - consistentHash: - description: |- - Consistent Hash-based load balancing can be used to provide soft session - affinity based on HTTP headers, cookies or other properties. This load balancing - policy is applicable only for HTTP connections. The affinity to a particular - destination host will be lost when one or more hosts are added/removed from the - destination service. This field specifies parameters that control consistent - hashing. This field only applies if the load_balancing_scheme is set to - INTERNAL_SELF_MANAGED. This field is only applicable when locality_lb_policy is - set to MAGLEV or RING_HASH. - properties: - httpCookie: - description: |- - Hash is based on HTTP Cookie. This field describes a HTTP cookie - that will be used as the hash key for the consistent hash load - balancer. If the cookie is not present, it will be generated. - This field is applicable if the sessionAffinity is set to HTTP_COOKIE. - properties: - name: - description: Name of the cookie. - type: string - path: - description: Path to set for the cookie. - type: string - ttl: - description: Lifetime of the cookie. - properties: - nanos: - description: |- - Span of time that's a fraction of a second at nanosecond - resolution. Durations less than one second are represented - with a 0 seconds field and a positive nanos field. Must - be from 0 to 999,999,999 inclusive. - type: integer - seconds: - description: |- - Span of time at a resolution of a second. - Must be from 0 to 315,576,000,000 inclusive. - type: integer - required: - - seconds - type: object - type: object - httpHeaderName: - description: |- - The hash based on the value of the specified header field. - This field is applicable if the sessionAffinity is set to HEADER_FIELD. - type: string - minimumRingSize: - description: |- - The minimum number of virtual nodes to use for the hash ring. - Larger ring sizes result in more granular load - distributions. If the number of hosts in the load balancing pool - is larger than the ring size, each host will be assigned a single - virtual node. - Defaults to 1024. - type: integer - type: object - customRequestHeaders: - description: |- - Headers that the HTTP/S load balancer should add to proxied - requests. - items: - type: string - type: array - description: - description: An optional description of this resource. - type: string - enableCdn: - description: If true, enable Cloud CDN for this BackendService. - type: boolean - failoverPolicy: - description: Policy for failovers. - properties: - disableConnectionDrainOnFailover: - description: |- - On failover or failback, this field indicates whether connection drain - will be honored. Setting this to true has the following effect: connections - to the old active pool are not drained. Connections to the new active pool - use the timeout of 10 min (currently fixed). Setting to false has the - following effect: both old and new connections will have a drain timeout - of 10 min. - This can be set to true only if the protocol is TCP. - The default is false. - type: boolean - dropTrafficIfUnhealthy: - description: |- - This option is used only when no healthy VMs are detected in the primary - and backup instance groups. When set to true, traffic is dropped. When - set to false, new connections are sent across all VMs in the primary group. - The default is false. - type: boolean - failoverRatio: - description: |- - The value of the field must be in [0, 1]. If the ratio of the healthy - VMs in the primary backend is at or below this number, traffic arriving - at the load-balanced IP will be directed to the failover backend. - In case where 'failoverRatio' is not set or all the VMs in the backup - backend are unhealthy, the traffic will be directed back to the primary - backend in the "force" mode, where traffic will be spread to the healthy - VMs with the best effort, or to all VMs when no VM is healthy. - This field is only used with l4 load balancing. - type: number - type: object - healthChecks: - items: - properties: - healthCheckRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - httpHealthCheckRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: object - type: array - iap: - description: Settings for enabling Cloud Identity Aware Proxy - properties: - oauth2ClientId: - description: OAuth2 Client ID for IAP - type: string - oauth2ClientSecret: - description: OAuth2 Client Secret for IAP - oneOf: - - not: - required: - - valueFrom - required: - - value - - not: - required: - - value - required: - - valueFrom - properties: - value: - description: Value of the field. Cannot be used if 'valueFrom' - is specified. - type: string - valueFrom: - description: Source for the field's value. Cannot be used if - 'value' is specified. - properties: - secretKeyRef: - description: Reference to a value with the given key in - the given Secret in the resource's namespace. - properties: - key: - description: Key that identifies the value to be extracted. - type: string - name: - description: Name of the Secret to extract a value from. - type: string - required: - - testKptName # {"$kpt-set":"name"} - - key - type: object - type: object - type: object - oauth2ClientSecretSha256: - description: OAuth2 Client Secret SHA-256 for IAP - type: string - required: - - oauth2ClientId - - oauth2ClientSecret - type: object - loadBalancingScheme: - description: |- - Indicates whether the backend service will be used with internal or - external load balancing. A backend service created for one type of - load balancing cannot be used with the other. Must be 'EXTERNAL' or - 'INTERNAL_SELF_MANAGED' for a global backend service. Defaults to 'EXTERNAL'. - type: string - localityLbPolicy: - description: |- - The load balancing algorithm used within the scope of the locality. - The possible values are - - - ROUND_ROBIN - This is a simple policy in which each healthy backend - is selected in round robin order. - - LEAST_REQUEST - An O(1) algorithm which selects two random healthy - hosts and picks the host which has fewer active requests. - - RING_HASH - The ring/modulo hash load balancer implements consistent - hashing to backends. The algorithm has the property that the - addition/removal of a host from a set of N hosts only affects - 1/N of the requests. - - RANDOM - The load balancer selects a random healthy host. - - ORIGINAL_DESTINATION - Backend host is selected based on the client - connection metadata, i.e., connections are opened - to the same address as the destination address of - the incoming connection before the connection - was redirected to the load balancer. - - MAGLEV - used as a drop in replacement for the ring hash load balancer. - Maglev is not as stable as ring hash but has faster table lookup - build times and host selection times. For more information about - Maglev, refer to https://ai.google/research/pubs/pub44824 - - This field is applicable only when the load_balancing_scheme is set to - INTERNAL_SELF_MANAGED. - type: string - location: - description: 'Location represents the geographical location of the ComputeBackendService. - Specify a region name or "global" for global resources. Reference: - GCP definition of regions/zones (https://cloud.google.com/compute/docs/regions-zones/)' - type: string - logConfig: - description: |- - This field denotes the logging options for the load balancer traffic served by this backend service. - If logging is enabled, logs will be exported to Stackdriver. - properties: - enable: - description: Whether to enable logging for the load balancer traffic - served by this backend service. - type: boolean - sampleRate: - description: |- - This field can only be specified if logging is enabled for this backend service. The value of - the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer - where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. - The default value is 1.0. - type: number - type: object - networkRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - outlierDetection: - description: |- - Settings controlling eviction of unhealthy hosts from the load balancing pool. - This field is applicable only when the load_balancing_scheme is set - to INTERNAL_SELF_MANAGED. - properties: - baseEjectionTime: - description: |- - The base time that a host is ejected for. The real time is equal to the base - time multiplied by the number of times the host has been ejected. Defaults to - 30000ms or 30s. - properties: - nanos: - description: |- - Span of time that's a fraction of a second at nanosecond resolution. Durations - less than one second are represented with a 0 'seconds' field and a positive - 'nanos' field. Must be from 0 to 999,999,999 inclusive. - type: integer - seconds: - description: |- - Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 - inclusive. - type: integer - required: - - seconds - type: object - consecutiveErrors: - description: |- - Number of errors before a host is ejected from the connection pool. When the - backend host is accessed over HTTP, a 5xx return code qualifies as an error. - Defaults to 5. - type: integer - consecutiveGatewayFailure: - description: |- - The number of consecutive gateway failures (502, 503, 504 status or connection - errors that are mapped to one of those status codes) before a consecutive - gateway failure ejection occurs. Defaults to 5. - type: integer - enforcingConsecutiveErrors: - description: |- - The percentage chance that a host will be actually ejected when an outlier - status is detected through consecutive 5xx. This setting can be used to disable - ejection or to ramp it up slowly. Defaults to 100. - type: integer - enforcingConsecutiveGatewayFailure: - description: |- - The percentage chance that a host will be actually ejected when an outlier - status is detected through consecutive gateway failures. This setting can be - used to disable ejection or to ramp it up slowly. Defaults to 0. - type: integer - enforcingSuccessRate: - description: |- - The percentage chance that a host will be actually ejected when an outlier - status is detected through success rate statistics. This setting can be used to - disable ejection or to ramp it up slowly. Defaults to 100. - type: integer - interval: - description: |- - Time interval between ejection sweep analysis. This can result in both new - ejections as well as hosts being returned to service. Defaults to 10 seconds. - properties: - nanos: - description: |- - Span of time that's a fraction of a second at nanosecond resolution. Durations - less than one second are represented with a 0 'seconds' field and a positive - 'nanos' field. Must be from 0 to 999,999,999 inclusive. - type: integer - seconds: - description: |- - Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 - inclusive. - type: integer - required: - - seconds - type: object - maxEjectionPercent: - description: |- - Maximum percentage of hosts in the load balancing pool for the backend service - that can be ejected. Defaults to 10%. - type: integer - successRateMinimumHosts: - description: |- - The number of hosts in a cluster that must have enough request volume to detect - success rate outliers. If the number of hosts is less than this setting, outlier - detection via success rate statistics is not performed for any host in the - cluster. Defaults to 5. - type: integer - successRateRequestVolume: - description: |- - The minimum number of total requests that must be collected in one interval (as - defined by the interval duration above) to include this host in success rate - based outlier detection. If the volume is lower than this setting, outlier - detection via success rate statistics is not performed for that host. Defaults - to 100. - type: integer - successRateStdevFactor: - description: |- - This factor is used to determine the ejection threshold for success rate outlier - ejection. The ejection threshold is the difference between the mean success - rate, and the product of this factor and the standard deviation of the mean - success rate: mean - (stdev * success_rate_stdev_factor). This factor is divided - by a thousand to get a double. That is, if the desired factor is 1.9, the - runtime value should be 1900. Defaults to 1900. - type: integer - type: object - portName: - description: |- - Name of backend port. The same name should appear in the instance - groups referenced by this service. Required when the load balancing - scheme is EXTERNAL. - type: string - protocol: - description: |- - The protocol this BackendService uses to communicate with backends. - Possible values are HTTP, HTTPS, HTTP2, TCP, and SSL. The default is - HTTP. **NOTE**: HTTP2 is only valid for beta HTTP/2 load balancer - types and may result in errors if used with the GA API. - type: string - securityPolicyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - sessionAffinity: - description: |- - Type of session affinity to use. The default is NONE. Session affinity is - not applicable if the protocol is UDP. - type: string - timeoutSec: - description: |- - How many seconds to wait for the backend before considering it a - failed request. Default is 30 seconds. Valid range is [1, 86400]. - type: integer - required: - - healthChecks - - location - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTimestamp: - description: Creation timestamp in RFC3339 text format. - type: string - fingerprint: - description: |- - Fingerprint of this resource. A hash of the contents stored in this - object. This field is used in optimistic locking. - type: string - selfLink: - type: string - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computedisks.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeDisk - plural: computedisks - shortNames: - - gcpcomputedisk - - gcpcomputedisks - singular: computedisk - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - description: - description: |- - An optional description of this resource. Provide this property when - you create the resource. - type: string - diskEncryptionKey: - description: |- - Encrypts the disk using a customer-supplied encryption key. - - After you encrypt a disk with a customer-supplied key, you must - provide the same key if you use the disk later (e.g. to create a disk - snapshot or an image, or to attach the disk to a virtual machine). - - Customer-supplied encryption keys do not protect access to metadata of - the disk. - - If you do not provide an encryption key when creating the disk, then - the disk will be encrypted using an automatically generated key and - you do not need to provide a key to use the disk later. - properties: - kmsKeyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - rawKey: - description: |- - Specifies a 256-bit customer-supplied encryption key, encoded in - RFC 4648 base64 to either encrypt or decrypt this resource. - oneOf: - - not: - required: - - valueFrom - required: - - value - - not: - required: - - value - required: - - valueFrom - properties: - value: - description: Value of the field. Cannot be used if 'valueFrom' - is specified. - type: string - valueFrom: - description: Source for the field's value. Cannot be used if - 'value' is specified. - properties: - secretKeyRef: - description: Reference to a value with the given key in - the given Secret in the resource's namespace. - properties: - key: - description: Key that identifies the value to be extracted. - type: string - name: - description: Name of the Secret to extract a value from. - type: string - required: - - testKptName # {"$kpt-set":"name"} - - key - type: object - type: object - type: object - sha256: - description: |- - The RFC 4648 base64 encoded SHA-256 hash of the customer-supplied - encryption key that protects this resource. - type: string - type: object - imageRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - location: - description: 'Location represents the geographical location of the ComputeDisk. - Specify a region name or a zone name. Reference: GCP definition of - regions/zones (https://cloud.google.com/compute/docs/regions-zones/)' - type: string - physicalBlockSizeBytes: - description: |- - Physical block size of the persistent disk, in bytes. If not present - in a request, a default value is used. Currently supported sizes - are 4096 and 16384, other sizes may be added in the future. - If an unsupported value is requested, the error message will list - the supported values for the caller's project. - type: integer - replicaZones: - description: URLs of the zones where the disk should be replicated to. - items: - type: string - type: array - resourcePolicies: - items: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: array - size: - description: |- - Size of the persistent disk, specified in GB. You can specify this - field when creating a persistent disk using the 'image' or - 'snapshot' parameter, or specify it alone to create an empty - persistent disk. - - If you specify this field along with 'image' or 'snapshot', - the value must not be less than the size of the image - or the size of the snapshot. - type: integer - snapshotRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - sourceImageEncryptionKey: - description: |- - The customer-supplied encryption key of the source image. Required if - the source image is protected by a customer-supplied encryption key. - properties: - kmsKeyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - rawKey: - description: |- - Specifies a 256-bit customer-supplied encryption key, encoded in - RFC 4648 base64 to either encrypt or decrypt this resource. - type: string - sha256: - description: |- - The RFC 4648 base64 encoded SHA-256 hash of the customer-supplied - encryption key that protects this resource. - type: string - type: object - sourceSnapshotEncryptionKey: - description: |- - The customer-supplied encryption key of the source snapshot. Required - if the source snapshot is protected by a customer-supplied encryption - key. - properties: - kmsKeyRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - rawKey: - description: |- - Specifies a 256-bit customer-supplied encryption key, encoded in - RFC 4648 base64 to either encrypt or decrypt this resource. - type: string - sha256: - description: |- - The RFC 4648 base64 encoded SHA-256 hash of the customer-supplied - encryption key that protects this resource. - type: string - type: object - type: - description: |- - URL of the disk type resource describing which disk type to use to - create the disk. Provide this when creating the disk. - type: string - required: - - location - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTimestamp: - description: Creation timestamp in RFC3339 text format. - type: string - labelFingerprint: - description: |- - The fingerprint used for optimistic locking of this resource. Used - internally during updates. - type: string - lastAttachTimestamp: - description: Last attach timestamp in RFC3339 text format. - type: string - lastDetachTimestamp: - description: Last detach timestamp in RFC3339 text format. - type: string - selfLink: - type: string - sourceImageId: - description: |- - The ID value of the image used to create this disk. This value - identifies the exact image that was used to create this persistent - disk. For example, if you created the persistent disk from an image - that was later deleted and recreated under the same name, the source - image ID would identify the exact version of the image that was used. - type: string - sourceSnapshotId: - description: |- - The unique ID of the snapshot used to create this disk. This value - identifies the exact snapshot that was used to create this persistent - disk. For example, if you created the persistent disk from a snapshot - that was later deleted and recreated under the same name, the source - snapshot ID would identify the exact version of the snapshot that was - used. - type: string - users: - description: |- - Links to the users of the disk (attached instances) in form: - project/zones/zone/instances/instance - items: - type: string - type: array - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computeexternalvpngateways.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeExternalVPNGateway - plural: computeexternalvpngateways - shortNames: - - gcpcomputeexternalvpngateway - - gcpcomputeexternalvpngateways - singular: computeexternalvpngateway - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - description: - description: An optional description of this resource. - type: string - interface: - description: A list of interfaces on this external VPN gateway. - items: - properties: - id: - description: |- - The numberic ID for this interface. Allowed values are based on the redundancy type - of this external VPN gateway - * '0 - SINGLE_IP_INTERNALLY_REDUNDANT' - * '0, 1 - TWO_IPS_REDUNDANCY' - * '0, 1, 2, 3 - FOUR_IPS_REDUNDANCY' - type: integer - ipAddress: - description: |- - IP address of the interface in the external VPN gateway. - Only IPv4 is supported. This IP address can be either from - your on-premise gateway or another Cloud provider’s VPN gateway, - it cannot be an IP address from Google Compute Engine. - type: string - type: object - type: array - redundancyType: - description: Indicates the redundancy type of this external VPN gateway - type: string - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - selfLink: - type: string - type: object - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] ---- -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cnrm.cloud.google.com/version: 1.7.1 - creationTimestamp: null - labels: - cnrm.cloud.google.com/managed-by-kcc: "true" - cnrm.cloud.google.com/system: "true" - cnrm.cloud.google.com/tf2crd: "true" - name: computefirewalls.compute.cnrm.cloud.google.com -spec: - group: compute.cnrm.cloud.google.com - names: - categories: - - gcp - kind: ComputeFirewall - plural: computefirewalls - shortNames: - - gcpcomputefirewall - - gcpcomputefirewalls - singular: computefirewall - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'apiVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - allow: - description: |- - The list of ALLOW rules specified by this firewall. Each rule - specifies a protocol and port-range tuple that describes a permitted - connection. - items: - properties: - ports: - description: |- - An optional list of ports to which this rule applies. This field - is only applicable for UDP or TCP protocol. Each entry must be - either an integer or a range. If not specified, this rule - applies to connections through any port. - - Example inputs include: ["22"], ["80","443"], and - ["12345-12349"]. - items: - type: string - type: array - protocol: - description: |- - The IP protocol to which this rule applies. The protocol type is - required when creating a firewall rule. This value can either be - one of the following well known protocol strings (tcp, udp, - icmp, esp, ah, sctp), or the IP protocol number. - type: string - required: - - protocol - type: object - type: array - deny: - description: |- - The list of DENY rules specified by this firewall. Each rule specifies - a protocol and port-range tuple that describes a denied connection. - items: - properties: - ports: - description: |- - An optional list of ports to which this rule applies. This field - is only applicable for UDP or TCP protocol. Each entry must be - either an integer or a range. If not specified, this rule - applies to connections through any port. - - Example inputs include: ["22"], ["80","443"], and - ["12345-12349"]. - items: - type: string - type: array - protocol: - description: |- - The IP protocol to which this rule applies. The protocol type is - required when creating a firewall rule. This value can either be - one of the following well known protocol strings (tcp, udp, - icmp, esp, ah, sctp), or the IP protocol number. - type: string - required: - - protocol - type: object - type: array - description: - description: |- - An optional description of this resource. Provide this property when - you create the resource. - type: string - destinationRanges: - description: |- - If destination ranges are specified, the firewall will apply only to - traffic that has destination IP address in these ranges. These ranges - must be expressed in CIDR format. Only IPv4 is supported. - items: - type: string - type: array - direction: - description: |- - Direction of traffic to which this firewall applies; default is - INGRESS. Note: For INGRESS traffic, it is NOT supported to specify - destinationRanges; For EGRESS traffic, it is NOT supported to specify - sourceRanges OR sourceTags. - type: string - disabled: - description: |- - Denotes whether the firewall rule is disabled, i.e not applied to the - network it is associated with. When set to true, the firewall rule is - not enforced and the network behaves as if it did not exist. If this - is unspecified, the firewall rule will be enabled. - type: boolean - enableLogging: - description: |- - This field denotes whether to enable logging for a particular - firewall rule. If logging is enabled, logs will be exported to - Stackdriver. - type: boolean - networkRef: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - priority: - description: |- - Priority for this rule. This is an integer between 0 and 65535, both - inclusive. When not specified, the value assumed is 1000. Relative - priorities determine precedence of conflicting rules. Lower value of - priority implies higher precedence (eg, a rule with priority 0 has - higher precedence than a rule with priority 1). DENY rules take - precedence over ALLOW rules having equal priority. - type: integer - sourceRanges: - description: |- - If source ranges are specified, the firewall will apply only to - traffic that has source IP address in these ranges. These ranges must - be expressed in CIDR format. One or both of sourceRanges and - sourceTags may be set. If both properties are set, the firewall will - apply to traffic that has source IP address within sourceRanges OR the - source IP that belongs to a tag listed in the sourceTags property. The - connection does not need to match both properties for the firewall to - apply. Only IPv4 is supported. - items: - type: string - type: array - sourceServiceAccounts: - items: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: array - sourceTags: - description: |- - If source tags are specified, the firewall will apply only to traffic - with source IP that belongs to a tag listed in source tags. Source - tags cannot be used to control traffic to an instance's external IP - address. Because tags are associated with an instance, not an IP - address. One or both of sourceRanges and sourceTags may be set. If - both properties are set, the firewall will apply to traffic that has - source IP address within sourceRanges OR the source IP that belongs to - a tag listed in the sourceTags property. The connection does not need - to match both properties for the firewall to apply. - items: - type: string - type: array - targetServiceAccounts: - items: - oneOf: - - not: - required: - - external - required: - - testKptName # {"$kpt-set":"name"} - - not: - anyOf: - - required: - - testKptName # {"$kpt-set":"name"} - - required: - - namespace - required: - - external - properties: - external: - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names' - type: string - namespace: - description: 'Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/' - type: string - type: object - type: array - targetTags: - description: |- - A list of instance tags indicating sets of instances located in the - network that may make network connections as specified in allowed[]. - If no targetTags are specified, the firewall rule applies to all - instances on the specified network. - items: - type: string - type: array - required: - - networkRef - type: object - status: - properties: - conditions: - description: Conditions represents the latest available observation - of the resource's current state. - items: - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - type: string - message: - description: Human-readable message indicating details about last - transition. - type: string - reason: - description: Unique, one-word, CamelCase reason for the condition's - last transition. - type: string - status: - description: Status is the status of the condition. Can be True, - False, Unknown. - type: string - type: - description: Type is the type of the condition. - type: string - type: object - type: array - creationTimestamp: - description: Creation timestamp in RFC3339 text format. - type: string - selfLink: - type: string - type: object - required: - - spec - type: object - version: v1beta1 -status: - acceptedNames: - kind: "" - plural: "" - conditions: [] - storedVersions: [] diff --git a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/kustomization.yaml deleted file mode 100644 index 3d6bbd8ba8..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/management/cnrm-install/install-system/kustomization.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- 0-cnrm-system.yaml -- crds.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/README.md b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/README.md deleted file mode 100644 index 514d7d462d..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/README.md +++ /dev/null @@ -1,4 +0,0 @@ -# Private GKE Resoruces - -* This directory contains CNRM patches and resource definitions in order - to deploy Kubeflow on private GKE. \ No newline at end of file diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/cluster-private-patch.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/cluster-private-patch.yaml deleted file mode 100644 index f7073f3ef4..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/cluster-private-patch.yaml +++ /dev/null @@ -1,38 +0,0 @@ -# A patch to use private GKE clusters -apiVersion: container.cnrm.cloud.google.com/v1beta1 -kind: ContainerCluster -metadata: - clusterName: "customerProject/testLocation/testKptName" # {"$kpt-set":"asm-cluster-name"} - name: testKptName # {"$kpt-set":"name"} -spec: - # https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1/projects.locations.clusters#Cluster.PrivateClusterConfig - # This is the least secure config because it allows access to master from all public IPs. - # For alternative options see the above link. - privateClusterConfig: - enablePrivateNodes: true - # We set enablePrivateEndpoint to false because we want a publicly accessible endpoint. - enablePrivateEndpoint: false - # Keep this in sync with the range specified in the allow-egress to master firewall rule. - masterIpv4CidrBlock: 172.16.0.32/28 - # - # TODO(https://github.com/kubeflow/gcp-blueprints/issues/32): Following options don't appear to be supported in CNRM; will private GKE work - # without them? - ipAllocationPolicy: - # Make the cluster VPC Native - useIpAliases: true - createSubnetwork: false - # TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields - # Automatic creation of the subnetwork and its secondary ranges doesn't seem to be possible - # with CNRM. We have an explicit CNRM resource for the subnetwork which we reference - # in subnetworkRef. The names for the secondary resources listed here should map to those - # resources. - clusterSecondaryRangeName: pods - servicesSecondaryRangeName: services - # TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields - # don't seem to be included in CNRM 1.9.1 - #createSubnetwork: true - # Create the clsuter in the private network we created. - networkRef: - name: testKptName # {"$kpt-set":"name"} - subnetworkRef: - name: testKptName # {"$kpt-set":"name"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/compute-network.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/compute-network.yaml deleted file mode 100644 index 9c4a0bebb6..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/compute-network.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeNetwork -metadata: - name: testKptName # {"$kpt-set":"name"} -spec: - routingMode: GLOBAL - autoCreateSubnetworks: false - deleteDefaultRoutesOnCreate: true ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeSubnetwork -metadata: - name: testKptName # {"$kpt-set":"name"} -spec: - ipCidrRange: 10.10.10.0/24 - region: testRegion # {"$kpt-set":"gcloud.compute.region"} - description: kubeflow private subnet - privateIpGoogleAccess: true - networkRef: - name: testKptName # {"$kpt-set":"name"} - logConfig: - aggregationInterval: INTERVAL_10_MIN - flowSampling: 0.5 - metadata: INCLUDE_ALL_METADATA - secondaryIpRange: - - ipCidrRange: 10.10.11.0/24 - rangeName: services - - ipCidrRange: 10.1.0.0/16 - rangeName: pods ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeRoute -metadata: - name: testKptName-google-apis # {"$kpt-set":"name-google-apis"} -spec: - destRange: 199.36.153.4/30 - networkRef: - name: testKptName # {"$kpt-set":"name"} - nextHopGateway: default-internet-gateway - priority: 1000 ---- -# We need a default internet route in order to allow outbound internet access using CloudNat -# Without outbound internet access ISTIO will be unable to download the -# jwks keys. In this case you can manually set the jwks keys in the ISTIO policy -# but you would have to manually rotate them as they expire. -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeRoute -metadata: - name: testKptName-internet # {"$kpt-set":"name-internet"} -spec: - description: "internet-route for IAP JWKS" - destRange: 0.0.0.0/0 - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Important this must be higher priority then the Google APIs route - # because otherwise we will end up trying to route calls to google APIs over public internet and we will have problems. - priority: 1100 - nextHopGateway: default-internet-gateway diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-gcr.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-gcr.yaml deleted file mode 100644 index e46e97faaa..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-gcr.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSManagedZone -metadata: - name: testKptName-gcr # {"$kpt-set":"name-gcr"} -spec: - description: "private zone for GCR.io" - dnsName: "gcr.io." - visibility: private - privateVisibilityConfig: - networks: - - networkRef: - name: testKptName # {"$kpt-set":"name"} ---- -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSRecordSet -metadata: - name: testKptName-gcr-cname # {"$kpt-set":"name-gcr-cname"} -spec: - name: "*.gcr.io." - type: "CNAME" - ttl: 300 - managedZoneRef: - name: testKptName-gcr # {"$kpt-set":"name-gcr"} - rrdatas: - - "gcr.io." ---- -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSRecordSet -metadata: - name: testKptName-gcr-a # {"$kpt-set":"name-gcr-a"} -spec: - name: "gcr.io." - type: "A" - ttl: 300 - managedZoneRef: - name: testKptName-gcr # {"$kpt-set":"name-gcr"} - rrdatas: - - "199.36.153.4" - - "199.36.153.5" - - "199.36.153.6" - - "199.36.153.7" diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-google-apis.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-google-apis.yaml deleted file mode 100644 index f76e2a9c0d..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/dns-google-apis.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSManagedZone -metadata: - name: testKptName-goog-apis # {"$kpt-set":"name-goog-apis"} -spec: - description: "private zone for Google APIs" - dnsName: "googleapis.com." - visibility: private - privateVisibilityConfig: - networks: - - networkRef: - name: testKptName # {"$kpt-set":"name"} ---- -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSRecordSet -metadata: - name: testKptName-goog-cname # {"$kpt-set":"name-goog-cname"} -spec: - name: "*.googleapis.com." - type: "CNAME" - ttl: 300 - managedZoneRef: - name: testKptName-goog-apis # {"$kpt-set":"name-goog-apis"} - rrdatas: - - "restricted.googleapis.com." ---- -apiVersion: dns.cnrm.cloud.google.com/v1beta1 -kind: DNSRecordSet -metadata: - name: testKptName-goog-a # {"$kpt-set":"name-goog-a"} -spec: - name: "restricted.googleapis.com." - type: "A" - ttl: 300 - managedZoneRef: - name: testKptName-goog-apis # {"$kpt-set":"name-goog-apis"} - rrdatas: - - "199.36.153.4" - - "199.36.153.5" - - "199.36.153.6" - - "199.36.153.7" diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/enable-services.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/enable-services.yaml deleted file mode 100644 index 1689e2d2f3..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/enable-services.yaml +++ /dev/null @@ -1,10 +0,0 @@ -# Enable additional services needed when using cloud DNS -apiVersion: serviceusage.cnrm.cloud.google.com/v1beta1 -kind: Service -metadata: - annotations: - # use the deletion policy of abandon to ensure that the pubsub service remains enabled when this resource is deleted. - cnrm.cloud.google.com/deletion-policy: "abandon" - # this is unnecessary with the deletion-policy of 'abandon', but useful if the abandon policy is removed. - cnrm.cloud.google.com/disable-dependent-services: "false" - name: dns.googleapis.com diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/firewall.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/firewall.yaml deleted file mode 100644 index 4ecc8c98ea..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/firewall.yaml +++ /dev/null @@ -1,255 +0,0 @@ -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-deny-egress # {"$kpt-set":"name-deny-egress"} -spec: - description: "Deny all internet traffic by default" - deny: - - protocol: tcp - ports: - - "0-65535" - destinationRanges: - - 0.0.0.0/0 - direction: EGRESS - priority: 1100 - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-health-ingress # {"$kpt-set":"name-health-ingress"} -spec: - description: "Allow health check ingress" - allow: - - protocol: tcp - ports: - - "80" - - "443" - # Prober address for health checks: - # https://cloud.google.com/load-balancing/docs/health-checks - sourceRanges: - - 130.211.0.0/22 - - 35.191.0.0/16 - direction: INGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-health-egress # {"$kpt-set":"name-health-egress"} -spec: - description: "Allow health check egress" - allow: - - protocol: tcp - ports: - - "80" - - "443" - # Prober address for health checks: - # https://cloud.google.com/load-balancing/docs/health-checks - destinationRanges: - - 130.211.0.0/22 - - 35.191.0.0/16 - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-apis-egress # {"$kpt-set":"name-apis-egress"} -spec: - description: "Allow egress to google APIs" - allow: - - protocol: tcp - ports: - - "0-65535" - destinationRanges: - - 199.36.153.4/30 - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-master-egress # {"$kpt-set":"name-master-egress"} -spec: - description: "Allow master node egress" - allow: - - protocol: tcp - ports: - - "443" - - "10250" - destinationRanges: - # Keep this in sync with the masterCidrBlock specified in cluster-private-patch.yaml - - 172.16.0.32/28 - # TODO(jlewi): This was a bit of a hack to try to fix failing health checks during cluster - # provisioning. I was seeing packets get blocket. - #- 172.217.0.0/28 - - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-int-egress # {"$kpt-set":"name-int-egress"} -spec: - description: "Allow traffic to internal ips" - allow: - - protocol: tcp - ports: - - "0-65535" - destinationRanges: - - 10.0.0.0/8 - # This rule is needed to ensure that any K8s services running within the cluster are accessible - - 192.168.0.0/16 - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -# Per https://istio.io/docs/setup/platform-setup/gke/ -# GKE will not automatically create a rule allowing traffic to the istio side car -# webhook ports so we need to add that. -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-istio # {"$kpt-set":"name-istio"} -spec: - description: "Allow traffic to ISTIO webhook" - allow: - - protocol: tcp - ports: - # In ASM 1.4 the port is 9443. Starting in ASM 1.5 the port is 15017 - - "15017" - - "9443" - sourceRanges: - - 172.16.0.32/28 - direction: INGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -# Per https://docs.cert-manager.io/en/release-0.11/getting-started/webhook.html#running-on-private-gke-clusters -# We need an extra firewall rule to allow certmanager webhooks. -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-cm # {"$kpt-set":"name-cm"} -spec: - description: "Allow traffic to cert manager webhook" - allow: - - protocol: tcp - ports: - - "443" - - "6443" - sourceRanges: - - 172.16.0.32/28 - direction: INGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -# Allow traffic to DockerHub so we can pull docker images. -# -# IP addresses can be obtained by running -# 1. nslookup index.dockerhub.io -# 2. nslookup dockerhub.io -# 3. nslookup registry-1.docker.io -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-dockerhub # {"$kpt-set":"name-dockerhub"} -spec: - description: "Allow egress to dockerhub and quay.io" - allow: - - protocol: tcp - ports: - - "443" - - "80" - destinationRanges: - # Keep this in sync with the masterCidrBlock specified in cluster-private-patch.yaml - - "3.211.199.249" - - "18.232.227.119" - - "18.213.137.78" - - "23.22.155.84" - - "23.202.231.169" - - "23.217.138.110" - - "52.54.232.21" - - "52.72.232.213" - - "54.85.107.53" - - "54.236.131.166" - - "107.23.149.57" - - "217.70.184.38" - # production.cloudfare.docker.com - - "104.18.121.25" - - "104.18.122.25" - - "104.18.123.25" - - "104.18.124.25" - - "104.18.125.25" - # quay.io - - "3.218.162.19" - - "18.205.55.240" - - "52.202.225.67" - - "54.84.167.150" - - "13.227.47.39" - - "13.227.47.84" - - "13.227.47.105" - # cdn.quay.io - - "13.35.101.24" - - "13.35.101.91" - - "13.35.101.101" - - "13.35.101.104" - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeFirewall -metadata: - name: testKptName-iap-jwks # {"$kpt-set":"name-iap-jwks"} -spec: - description: "Allow traffic to www.gstatic.com to get IAP JWKs" - allow: - - protocol: tcp - ports: - - "443" - # JWKS should be served on www.gstatic.com and parallel domains - # g0.static.com - # g1.static.com - # g2.static.com - # g3.static.com - # The actual addresses appear to be the 172 addreses not the static - destinationRanges: - - "172.217.6.163" - - "172.217.6.131" - - "172.217.9.163" - - "172.217.1.131" - - "172.217.212.94" - - "172.217.204.94" - - "23.217.138.110" - - "23.202.231.169" - direction: EGRESS - networkRef: - name: testKptName # {"$kpt-set":"name"} - # Enable logging to help debugging - enableLogging: true # {"$kpt-set":"log-firewalls"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomization.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomization.yaml deleted file mode 100644 index f3ba93ab04..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomization.yaml +++ /dev/null @@ -1,12 +0,0 @@ -# This kustomization defines additional networking resoruces to setup -# as part of private deployments. -# For more info see: https://medium.com/google-cloud/completely-private-gke-clusters-with-no-internet-connectivity-945fffae1ccd -# N.b cluster-private-patch.yaml isn't included because we don't define the clsuter -# here so we can't patch it. -resources: -- compute-network.yaml -- enable-services.yaml -- dns-gcr.yaml -- dns-google-apis.yaml -- firewall.yaml -- nat.yaml diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/README.md b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/README.md deleted file mode 100644 index 24fccd6cc6..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/README.md +++ /dev/null @@ -1,4 +0,0 @@ -# Kustomize FNs - -This directory contains configurations for kustomize/kpt functions -that are intended to be applied with kpt. \ No newline at end of file diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/image_prefix.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/image_prefix.yaml deleted file mode 100644 index e7711e9606..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/kustomize-fns/image_prefix.yaml +++ /dev/null @@ -1,17 +0,0 @@ -# Define a transform to change all the image prefixes to use images from a different registry -apiVersion: v1alpha1 # Define a transform to change all the image prefixes to use images from a different registry -kind: ImagePrefix -metadata: - name: use-mirror-images-gcr - annotations: - config.kubernetes.io/function: | - container: - image: gcr.io/kubeflow-images-public/kpt-fns:v1.0-rc.3-58-g616f986-dirty -spec: - imageMappings: - - src: quay.io/jetstack - dest: gcr.io/customerProject/mirror/quay.io/jetstack # {"$kpt-set":"image-mirror-quay-io-jetstack"} - - src: gcr.io/kubeflow-images-public - dest: gcr.io/customerProject/mirror/gcr.io/kubeflow-images-public # {"$kpt-set":"image-mirror-kubeflow-images-public"} - - src: metacontroller - dest: gcr.io/customerProject/mirror/metacontroller # {"$kpt-set":"image-mirror-metacontroller"} diff --git a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/nat.yaml b/tests/testdata_gcp_kpt/gcp/v2/privateGKE/nat.yaml deleted file mode 100644 index 0d4780739d..0000000000 --- a/tests/testdata_gcp_kpt/gcp/v2/privateGKE/nat.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeRouter -metadata: - name: testKptName # {"$kpt-set":"name"} -spec: - description: Router to allow outbound internet access - region: testRegion # {"$kpt-set":"gcloud.compute.region"} - networkRef: - name: testKptName # {"$kpt-set":"name"} ---- -apiVersion: compute.cnrm.cloud.google.com/v1beta1 -kind: ComputeRouterNAT -metadata: - name: testKptName # {"$kpt-set":"name"} -spec: - region: testRegion # {"$kpt-set":"gcloud.compute.region"} - routerRef: - name: testKptName # {"$kpt-set":"name"} - natIpAllocateOption: AUTO_ONLY - sourceSubnetworkIpRangesToNat: ALL_SUBNETWORKS_ALL_IP_RANGES diff --git a/tests/tests/legacy_kustomizations/api-service/kustomize_test.go b/tests/tests/legacy_kustomizations/api-service/kustomize_test.go deleted file mode 100644 index 168e54aa31..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package api_service - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/api-service", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/app.k8s.io_v1beta1_application_api-service.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/app.k8s.io_v1beta1_application_api-service.yaml deleted file mode 100644 index d4ca3d074f..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/app.k8s.io_v1beta1_application_api-service.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: api-service - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - api-service - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: api-service - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/apps_v1_deployment_ml-pipeline.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/apps_v1_deployment_ml-pipeline.yaml deleted file mode 100644 index 96f651488a..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/apps_v1_deployment_ml-pipeline.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - command: - - apiserver - - --config=/etc/ml-pipeline-config - - --sampleconfig=/config/sample_config.json - - -logtostderr=true - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/api-server:0.2.5 - imagePullPolicy: IfNotPresent - name: ml-pipeline-api-server - ports: - - containerPort: 8888 - - containerPort: 8887 - volumeMounts: - - mountPath: /etc/ml-pipeline-config - name: config-volume - serviceAccountName: ml-pipeline - volumes: - - configMap: - name: ml-pipeline-config - name: config-volume diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline.yaml deleted file mode 100644 index 71b65ae098..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - update - - patch - - delete -- apiGroups: - - "" - resources: - - pods - verbs: - - delete diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline.yaml deleted file mode 100644 index 852f9f4651..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline -subjects: -- kind: ServiceAccount - name: ml-pipeline - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_configmap_ml-pipeline-config.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_configmap_ml-pipeline-config.yaml deleted file mode 100644 index 28721d830c..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_configmap_ml-pipeline-config.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -data: - config.json: | - { - "DBConfig": { - "DriverName": "mysql", - "DataSourceName": "", - "DBName": "mlpipeline", - "GroupConcatMaxLen": "4194304" - }, - "ObjectStoreConfig":{ - "AccessKey": "minio", - "SecretAccessKey": "minio123", - "BucketName": "mlpipeline", - "Secure": false - }, - "InitConnectionTimeout": "6m", - "DefaultPipelineRunnerServiceAccount": "pipeline-runner", - "ML_PIPELINE_VISUALIZATIONSERVER_SERVICE_HOST": "ml-pipeline-ml-pipeline-visualizationserver", - "ML_PIPELINE_VISUALIZATIONSERVER_SERVICE_PORT": 8888 - } -kind: ConfigMap -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_service_ml-pipeline.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_service_ml-pipeline.yaml deleted file mode 100644 index 574f9e1a01..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_service_ml-pipeline.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - - name: grpc - port: 8887 - protocol: TCP - targetPort: 8887 - selector: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 diff --git a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml b/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml deleted file mode 100644 index a716c0f760..0000000000 --- a/tests/tests/legacy_kustomizations/api-service/test_data/expected/~g_v1_serviceaccount_ml-pipeline.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: ml-pipeline - app.kubernetes.io/component: api-service - app.kubernetes.io/instance: api-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: api-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/application-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/application-crds/kustomize_test.go deleted file mode 100644 index 33f473fed7..0000000000 --- a/tests/tests/legacy_kustomizations/application-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package application_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/application-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/application-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_applications.app.k8s.io.yaml b/tests/tests/legacy_kustomizations/application-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_applications.app.k8s.io.yaml deleted file mode 100644 index bd5a7b2938..0000000000 --- a/tests/tests/legacy_kustomizations/application-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_applications.app.k8s.io.yaml +++ /dev/null @@ -1,233 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: applications.app.k8s.io -spec: - group: app.k8s.io - names: - kind: Application - plural: applications - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - addOwnerRef: - type: boolean - assemblyPhase: - type: string - componentKinds: - items: - type: object - type: array - descriptor: - properties: - description: - type: string - icons: - items: - properties: - size: - type: string - src: - type: string - type: - type: string - required: - - src - type: object - type: array - keywords: - items: - type: string - type: array - links: - items: - properties: - description: - type: string - url: - type: string - type: object - type: array - maintainers: - items: - properties: - email: - type: string - name: - type: string - url: - type: string - type: object - type: array - notes: - type: string - owners: - items: - properties: - email: - type: string - name: - type: string - url: - type: string - type: object - type: array - type: - type: string - version: - type: string - type: object - info: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - key: - type: string - kind: - type: string - name: - type: string - namespace: - type: string - resourceVersion: - type: string - uid: - type: string - type: object - ingressRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - host: - type: string - kind: - type: string - name: - type: string - namespace: - type: string - path: - type: string - resourceVersion: - type: string - uid: - type: string - type: object - secretKeyRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - key: - type: string - kind: - type: string - name: - type: string - namespace: - type: string - resourceVersion: - type: string - uid: - type: string - type: object - serviceRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - kind: - type: string - name: - type: string - namespace: - type: string - path: - type: string - port: - format: int32 - type: integer - resourceVersion: - type: string - uid: - type: string - type: object - type: - type: string - type: object - type: object - type: array - selector: - type: object - type: object - status: - properties: - components: - items: - properties: - group: - type: string - kind: - type: string - link: - type: string - name: - type: string - status: - type: string - type: object - type: array - conditions: - items: - properties: - lastTransitionTime: - format: date-time - type: string - lastUpdateTime: - format: date-time - type: string - message: - type: string - reason: - type: string - status: - type: string - type: - type: string - required: - - type - - status - type: object - type: array - observedGeneration: - format: int64 - type: integer - type: object - version: v1beta1 diff --git a/tests/tests/legacy_kustomizations/application/kustomize_test.go b/tests/tests/legacy_kustomizations/application/kustomize_test.go deleted file mode 100644 index ada879cfb5..0000000000 --- a/tests/tests/legacy_kustomizations/application/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package application - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/application", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/app.k8s.io_v1beta1_application_kubeflow.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/app.k8s.io_v1beta1_application_kubeflow.yaml deleted file mode 100644 index 5aeb8eca0f..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/app.k8s.io_v1beta1_application_kubeflow.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: kubeflow - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: app.k8s.io - kind: Application - descriptor: - description: application that aggregates all kubeflow applications - keywords: - - kubeflow - links: - - description: About - url: https://kubeflow.org - maintainers: - - email: jlewi@google.com - name: Jeremy Lewi - - email: kam.d.kasravi@intel.com - name: Kam Kasravi - owners: - - email: jlewi@google.com - name: Jeremy Lewi - type: kubeflow - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/apps_v1_statefulset_application-controller-stateful-set.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/apps_v1_statefulset_application-controller-stateful-set.yaml deleted file mode 100644 index 0e90a3bd81..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/apps_v1_statefulset_application-controller-stateful-set.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-stateful-set - namespace: kubeflow -spec: - selector: - matchLabels: - app: application-controller - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - serviceName: application-controller-service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: application-controller - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - spec: - containers: - - command: - - /root/manager - env: - - name: project - value: jlewi-dev - image: gcr.io/kubeflow-images-public/kubernetes-sigs/application:1.0-beta - imagePullPolicy: Always - name: manager - serviceAccountName: application-controller-service-account - volumeClaimTemplates: [] diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_application-controller-cluster-role.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_application-controller-cluster-role.yaml deleted file mode 100644 index b21a318e37..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_application-controller-cluster-role.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-cluster-role -rules: -- apiGroups: - - '*' - resources: - - '*' - verbs: - - get - - list - - update - - patch - - watch -- apiGroups: - - app.k8s.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_application-controller-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_application-controller-cluster-role-binding.yaml deleted file mode 100644 index d4766b0e2b..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_application-controller-cluster-role-binding.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: application-controller-cluster-role -subjects: -- kind: ServiceAccount - name: application-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_configmap_application-controller-parameters.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_configmap_application-controller-parameters.yaml deleted file mode 100644 index 030f897afe..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_configmap_application-controller-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - project: jlewi-dev -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_service_application-controller-service.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_service_application-controller-service.yaml deleted file mode 100644 index 2d16896788..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_service_application-controller-service.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 diff --git a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_serviceaccount_application-controller-service-account.yaml b/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_serviceaccount_application-controller-service-account.yaml deleted file mode 100644 index 3f1db9c5e2..0000000000 --- a/tests/tests/legacy_kustomizations/application/test_data/expected/~g_v1_serviceaccount_application-controller-service-account.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: kubeflow - app.kubernetes.io/instance: kubeflow-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kubeflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: application-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/kustomize_test.go b/tests/tests/legacy_kustomizations/argo/kustomize_test.go deleted file mode 100644 index d7d2b2260d..0000000000 --- a/tests/tests/legacy_kustomizations/argo/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package argo - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/argo", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml deleted file mode 100644 index 8e23933934..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_workflows.argoproj.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: workflows.argoproj.io -spec: - group: argoproj.io - names: - kind: Workflow - listKind: WorkflowList - plural: workflows - shortNames: - - wf - singular: workflow - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml deleted file mode 100644 index 9104ca8fd4..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/app.k8s.io_v1beta1_application_argo.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - name: argo - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: core - kind: Service - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Argo Workflows is an open source container-native workflow engine - for orchestrating parallel jobs on Kubernetes - keywords: - - argo - - kubeflow - links: - - description: About - url: https://github.com/argoproj/argo - maintainers: [] - owners: [] - type: argo - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: argo - app.kubernetes.io/name: argo diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml deleted file mode 100644 index fa1be002b9..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_argo-ui.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - spec: - containers: - - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: IN_CLUSTER - value: "true" - - name: ENABLE_WEB_CONSOLE - value: "false" - - name: BASE_HREF - value: /argo/ - image: argoproj/argoui:v2.3.0 - imagePullPolicy: IfNotPresent - name: argo-ui - readinessProbe: - httpGet: - path: / - port: 8001 - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo-ui - serviceAccountName: argo-ui - terminationGracePeriodSeconds: 30 diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml deleted file mode 100644 index c703f767a4..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/apps_v1_deployment_workflow-controller.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: workflow-controller - namespace: kubeflow -spec: - progressDeadlineSeconds: 600 - replicas: 1 - revisionHistoryLimit: 10 - selector: - matchLabels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - strategy: - rollingUpdate: - maxSurge: 25% - maxUnavailable: 25% - type: RollingUpdate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - creationTimestamp: null - labels: - app: workflow-controller - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - spec: - containers: - - args: - - --configmap - - workflow-controller-configmap - command: - - workflow-controller - env: - - name: ARGO_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - image: argoproj/workflow-controller:v2.3.0 - imagePullPolicy: IfNotPresent - name: workflow-controller - resources: {} - terminationMessagePath: /dev/termination-log - terminationMessagePolicy: File - dnsPolicy: ClusterFirst - restartPolicy: Always - schedulerName: default-scheduler - securityContext: {} - serviceAccount: argo - serviceAccountName: argo - terminationGracePeriodSeconds: 30 diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml deleted file mode 100644 index 4b5bb07e43..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/networking.istio.io_v1alpha3_virtualservice_argo-ui.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - name: argo-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /argo/ - rewrite: - uri: / - route: - - destination: - host: argo-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml deleted file mode 100644 index ca3b4266a7..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo-ui.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo-ui -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml deleted file mode 100644 index 3ee47604a5..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_argo.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo -rules: -- apiGroups: - - "" - resources: - - pods - - pods/exec - verbs: - - create - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete -- apiGroups: - - argoproj.io - resources: - - workflows - - workflows/finalizers - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml deleted file mode 100644 index 9d4c1a2943..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo-ui -subjects: -- kind: ServiceAccount - name: argo-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml deleted file mode 100644 index e6df0fd2a1..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_argo.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: argo - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: argo -subjects: -- kind: ServiceAccount - name: argo - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml deleted file mode 100644 index 7b3bdb9673..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-configmap.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: v1 -data: - config: | - { - executorImage: argoproj/argoexec:v2.3.0, - containerRuntimeExecutor: docker, - artifactRepository: - { - s3: { - bucket: mlpipeline, - keyPrefix: artifacts, - endpoint: minio-service.kubeflow:9000, - insecure: true, - accessKeySecret: { - name: mlpipeline-minio-artifact, - key: accesskey - }, - secretKeySecret: { - name: mlpipeline-minio-artifact, - key: secretkey - } - } - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: workflow-controller-configmap - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml deleted file mode 100644 index 5cf9fdd585..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_configmap_workflow-controller-parameters.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -data: - artifactRepositoryAccessKeySecretKey: accesskey - artifactRepositoryAccessKeySecretName: mlpipeline-minio-artifact - artifactRepositoryBucket: mlpipeline - artifactRepositoryEndpoint: minio-service.kubeflow:9000 - artifactRepositoryInsecure: "true" - artifactRepositoryKeyPrefix: artifacts - artifactRepositorySecretKeySecretKey: secretkey - artifactRepositorySecretKeySecretName: mlpipeline-minio-artifact - clusterDomain: cluster.local - containerRuntimeExecutor: docker - executorImage: argoproj/argoexec:v2.3.0 - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: workflow-controller-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_service_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_service_argo-ui.yaml deleted file mode 100644 index 9876ae0299..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_service_argo-ui.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 8001 - selector: - app: argo-ui - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - sessionAffinity: None - type: NodePort diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml deleted file mode 100644 index 97cba0d509..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo-ui.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml b/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml deleted file mode 100644 index 62b65e2b1c..0000000000 --- a/tests/tests/legacy_kustomizations/argo/test_data/expected/~g_v1_serviceaccount_argo.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: argo - app.kubernetes.io/instance: argo-v2.3.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: argo - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v2.3.0 - kustomize.component: argo - name: argo - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/bootstrap/kustomize_test.go b/tests/tests/legacy_kustomizations/bootstrap/kustomize_test.go deleted file mode 100644 index cf0b576fa4..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package bootstrap - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/bootstrap", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml deleted file mode 100644 index 424677922a..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/app.k8s.io_v1beta1_application_bootstrap.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: bootstrap - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: StatefulSet - - group: core - kind: ServiceAccount - descriptor: - description: Bootstraps the admission-webhook controller - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml deleted file mode 100644 index f06e43a9ea..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/apps_v1_statefulset_admission-webhook-bootstrap-stateful-set.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-stateful-set - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - serviceName: service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - spec: - containers: - - command: - - sh - - /var/webhook-config/create_ca.sh - image: gcr.io/kubeflow-images-public/ingress-setup:latest - name: bootstrap - volumeMounts: - - mountPath: /var/webhook-config/ - name: admission-webhook-config - restartPolicy: Always - serviceAccountName: admission-webhook-bootstrap-service-account - volumes: - - configMap: - name: admission-webhook-bootstrap-config-map - name: admission-webhook-config - volumeClaimTemplates: [] diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml deleted file mode 100644 index ee5bd367e7..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_admission-webhook-bootstrap-cluster-role.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-cluster-role -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - "" - resources: - - secrets - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - list - - delete diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml deleted file mode 100644 index 6bf69170fb..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_admission-webhook-bootstrap-cluster-role-binding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-bootstrap-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-bootstrap-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml deleted file mode 100644 index 377ca5e5fd..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_configmap_admission-webhook-bootstrap-config-map.yaml +++ /dev/null @@ -1,143 +0,0 @@ -apiVersion: v1 -data: - create_ca.sh: | - #!/bin/bash - - set -e - - usage() { - cat <> ${tmpdir}/csr.conf - [req] - req_extensions = v3_req - distinguished_name = req_distinguished_name - [req_distinguished_name] - [ v3_req ] - basicConstraints = CA:FALSE - keyUsage = nonRepudiation, digitalSignature, keyEncipherment - extendedKeyUsage = serverAuth - subjectAltName = @alt_names - [alt_names] - DNS.1 = ${service} - DNS.2 = ${service}.${namespace} - DNS.3 = ${service}.${namespace}.svc - EOF - - openssl genrsa -out ${tmpdir}/server-key.pem 2048 - openssl req -new -key ${tmpdir}/server-key.pem -subj "/CN=${service}.${namespace}.svc" -out ${tmpdir}/server.csr -config ${tmpdir}/csr.conf - - # Self sign - openssl x509 -req -days 365 -in ${tmpdir}/server.csr -CA ${tmpdir}/self_ca.crt -CAkey ${tmpdir}/self_ca.key -CAcreateserial -out ${tmpdir}/server-cert.pem - - # create the secret with CA cert and server cert/key - kubectl create secret generic ${secret} \ - --from-file=key.pem=${tmpdir}/server-key.pem \ - --from-file=cert.pem=${tmpdir}/server-cert.pem \ - --dry-run -o yaml | - kubectl -n ${namespace} apply -f - - - # Webhook pod needs to be restarted so that the service reload the secret - # http://github.com/kueflow/kubeflow/issues/3227 - webhookPod=$(kubectl get pods -n ${namespace} |grep ${webhookDeploymentName} |awk '{print $1;}') - # ignore error if webhook pod does not exist - kubectl delete pod ${webhookPod} 2>/dev/null || true - echo "webhook ${webhookPod} is restarted to utilize the new secret" - - cat ${tmpdir}/self_ca.crt - - # -a means base64 encode - caBundle=$(cat ${tmpdir}/self_ca.crt | openssl enc -a -A) - echo ${caBundle} - - patchString='[{"op": "replace", "path": "/webhooks/0/clientConfig/caBundle", "value":"{{CA_BUNDLE}}"}]' - patchString=$(echo ${patchString} | sed "s|{{CA_BUNDLE}}|${caBundle}|g") - echo ${patchString} - - checkWebhookConfig() { - currentBundle=$(kubectl get mutatingwebhookconfigurations -n ${namespace} ${mutatingWebhookConfigName} -o jsonpath='{.webhooks[0].clientConfig.caBundle}') - [[ "$currentBundle" == "$caBundle" ]] - } - - while true; do - if ! checkWebhookConfig; then - echo "patching ca bundle for webhook configuration..." - kubectl patch mutatingwebhookconfiguration ${mutatingWebhookConfigName} \ - --type='json' -p="${patchString}" - fi - sleep 10 - done - namespace: kubeflow - webhookNamePrefix: admission-webhook- -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-config-map - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml b/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml deleted file mode 100644 index 59ca08eb06..0000000000 --- a/tests/tests/legacy_kustomizations/bootstrap/test_data/expected/~g_v1_serviceaccount_admission-webhook-bootstrap-service-account.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: bootstrap - app.kubernetes.io/instance: bootstrap-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: bootstrap - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook-bootstrap - name: admission-webhook-bootstrap-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/centraldashboard/kustomize_test.go b/tests/tests/legacy_kustomizations/centraldashboard/kustomize_test.go deleted file mode 100644 index b2a872e0a9..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package centraldashboard - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/centraldashboard", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml deleted file mode 100644 index 63d627a449..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/app.k8s.io_v1beta1_application_centraldashboard.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: centraldashboard - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a Dashboard UI for kubeflow - keywords: - - centraldashboard - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/centraldashboard - maintainers: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - owners: - - email: prodonjs@gmail.com - name: Jason Prodonovich - - email: apverma@google.com - name: Apoorv Verma - - email: adhita94@gmail.com - name: Adhita Selvaraj - type: centraldashboard - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/name: centraldashboard diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml deleted file mode 100644 index 4ff8cd9a1e..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/apps_v1_deployment_centraldashboard.yaml +++ /dev/null @@ -1,65 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - spec: - containers: - - env: - - name: USERID_HEADER - value: X-Goog-Authenticated-User-Email - - name: USERID_PREFIX - value: 'accounts.google.com:' - - name: PROFILES_KFAM_SERVICE_HOST - value: profiles-kfam.kubeflow - - name: REGISTRATION_FLOW - value: "true" - - name: DASHBOARD_LINKS_CONFIGMAP - value: centraldashboard-links-config - image: gcr.io/kubeflow-images-public/centraldashboard:vmaster-g8097cfeb - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /healthz - port: 8082 - initialDelaySeconds: 30 - periodSeconds: 30 - name: centraldashboard - ports: - - containerPort: 8082 - protocol: TCP - serviceAccountName: centraldashboard diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml deleted file mode 100644 index 29caf97d7c..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/networking.istio.io_v1alpha3_virtualservice_centraldashboard.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: centraldashboard - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: / - rewrite: - uri: / - route: - - destination: - host: centraldashboard.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml deleted file mode 100644 index c21d3db134..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_centraldashboard.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard -rules: -- apiGroups: - - "" - resources: - - events - - namespaces - - nodes - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml deleted file mode 100644 index c591660677..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_centraldashboard.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml deleted file mode 100644 index 38b7fa2212..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_role_centraldashboard.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -rules: -- apiGroups: - - "" - - app.k8s.io - resources: - - applications - - pods - - pods/exec - - pods/log - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - - configmaps - verbs: - - get diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml deleted file mode 100644 index 04ed56d844..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_centraldashboard.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: centraldashboard -subjects: -- kind: ServiceAccount - name: centraldashboard - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_configmap_parameters.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_configmap_parameters.yaml deleted file mode 100644 index 63e02066f5..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_configmap_parameters.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local - registration-flow: "true" - userid-header: X-Goog-Authenticated-User-Email - userid-prefix: 'accounts.google.com:' -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml deleted file mode 100644 index bb14a3186c..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_service_centraldashboard.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: centralui-mapping - prefix: / - rewrite: / - service: centraldashboard.kubeflow - labels: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow -spec: - ports: - - port: 80 - protocol: TCP - targetPort: 8082 - selector: - app: centraldashboard - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - sessionAffinity: None - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml b/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml deleted file mode 100644 index 841a8d370a..0000000000 --- a/tests/tests/legacy_kustomizations/centraldashboard/test_data/expected/~g_v1_serviceaccount_centraldashboard.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: centraldashboard - app.kubernetes.io/instance: centraldashboard-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: centraldashboard - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: centraldashboard - name: centraldashboard - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/cert-manager-crds/kustomize_test.go deleted file mode 100644 index 3ba7d6f7d8..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/cert-manager-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml deleted file mode 100644 index 0b81ee91ef..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificaterequests.cert-manager.io.yaml +++ /dev/null @@ -1,181 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificaterequests.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: CertificateRequest - listKind: CertificateRequestList - plural: certificaterequests - shortNames: - - cr - - crs - singular: certificaterequest - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: CertificateRequest is a type to represent a Certificate Signing - Request - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateRequestSpec defines the desired state of CertificateRequest - properties: - csr: - description: Byte slice containing the PEM encoded CertificateSigningRequest - format: byte - type: string - duration: - description: Requested certificate default Duration - type: string - isCA: - description: IsCA will mark the resulting certificate as valid for signing. - This implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this CertificateRequest. If - the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the CertificateRequest - will be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. The group field refers to the API group - of the issuer which defaults to 'cert-manager.io' if empty. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - type: object - status: - description: CertificateStatus defines the observed state of CertificateRequest - and resulting signed certificate. - properties: - ca: - description: Byte slice containing the PEM encoded certificate authority - of the signed certificate. - format: byte - type: string - certificate: - description: Byte slice containing a PEM encoded signed certificate - resulting from the given certificate signing request. - format: byte - type: string - conditions: - items: - description: CertificateRequestCondition contains condition information - for a CertificateRequest. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - failureTime: - description: FailureTime stores the time that this CertificateRequest - failed. This is used to influence garbage collection and back-off. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml deleted file mode 100644 index 6a46d9446b..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.cert-manager.io.yaml +++ /dev/null @@ -1,235 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: certificates.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: cert-manager.io - names: - kind: Certificate - listKind: CertificateList - plural: certificates - shortNames: - - cert - - certs - singular: certificate - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Certificate is a type to represent a Certificate from ACME - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: CertificateSpec defines the desired state of Certificate. A - valid Certificate requires at least one of a CommonName, DNSName, or URISAN - to be valid. - properties: - commonName: - description: CommonName is a common name to be used on the Certificate. - The CommonName should have a length of 64 characters or fewer to avoid - generating invalid CSRs. - type: string - dnsNames: - description: DNSNames is a list of subject alt names to be used on the - Certificate. - items: - type: string - type: array - duration: - description: Certificate default Duration - type: string - ipAddresses: - description: IPAddresses is a list of IP addresses to be used on the - Certificate - items: - type: string - type: array - isCA: - description: IsCA will mark this Certificate as valid for signing. This - implies that the 'cert sign' usage is set - type: boolean - issuerRef: - description: IssuerRef is a reference to the issuer for this certificate. - If the 'kind' field is not set, or set to 'Issuer', an Issuer resource - with the given name in the same namespace as the Certificate will - be used. If the 'kind' field is set to 'ClusterIssuer', a ClusterIssuer - with the provided name will be used. The 'name' field in this stanza - is required at all times. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - keyAlgorithm: - description: KeyAlgorithm is the private key algorithm of the corresponding - private key for this certificate. If provided, allowed values are - either "rsa" or "ecdsa" If KeyAlgorithm is specified and KeySize is - not provided, key size of 256 will be used for "ecdsa" key algorithm - and key size of 2048 will be used for "rsa" key algorithm. - enum: - - rsa - - ecdsa - type: string - keyEncoding: - description: KeyEncoding is the private key cryptography standards (PKCS) - for this certificate's private key to be encoded in. If provided, - allowed values are "pkcs1" and "pkcs8" standing for PKCS#1 and PKCS#8, - respectively. If KeyEncoding is not specified, then PKCS#1 will be - used by default. - enum: - - pkcs1 - - pkcs8 - type: string - keySize: - description: KeySize is the key bit size of the corresponding private - key for this certificate. If provided, value must be between 2048 - and 8192 inclusive when KeyAlgorithm is empty or is set to "rsa", - and value must be one of (256, 384, 521) when KeyAlgorithm is set - to "ecdsa". - type: integer - organization: - description: Organization is the organization to be used on the Certificate - items: - type: string - type: array - renewBefore: - description: Certificate renew before expiration duration - type: string - secretName: - description: SecretName is the name of the secret resource to store - this secret in - type: string - uriSANs: - description: URISANs is a list of URI Subject Alternative Names to be - set on this Certificate. - items: - type: string - type: array - usages: - description: Usages is the set of x509 actions that are enabled for - a given key. Defaults are ('digital signature', 'key encipherment') - if empty - items: - description: 'KeyUsage specifies valid usage contexts for keys. See: - https://tools.ietf.org/html/rfc5280#section-4.2.1.3 https://tools.ietf.org/html/rfc5280#section-4.2.1.12' - enum: - - signing - - digital signature - - content commitment - - key encipherment - - key agreement - - data encipherment - - cert sign - - crl sign - - encipher only - - decipher only - - any - - server auth - - client auth - - code signing - - email protection - - s/mime - - ipsec end system - - ipsec tunnel - - ipsec user - - timestamping - - ocsp signing - - microsoft sgc - - netscape sgc - type: string - type: array - required: - - issuerRef - - secretName - type: object - status: - description: CertificateStatus defines the observed state of Certificate - properties: - conditions: - items: - description: CertificateCondition contains condition information for - an Certificate. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - lastFailureTime: - format: date-time - type: string - notAfter: - description: The expiration time of the certificate stored in the secret - named by this resource in spec.secretName. - format: date-time - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml deleted file mode 100644 index 32c452b7c2..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.acme.cert-manager.io.yaml +++ /dev/null @@ -1,1369 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - name: challenges.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Challenge - listKind: ChallengeList - plural: challenges - singular: challenge - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Challenge is a type to represent a Challenge request with an ACME - server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - authzURL: - description: AuthzURL is the URL to the ACME Authorization resource - that this challenge is a part of. - type: string - dnsName: - description: DNSName is the identifier that this challenge is for, e.g. - example.com. - type: string - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Challenge. If the Issuer does - not exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Challenge will be marked - as failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - key: - description: Key is the ACME challenge key for this challenge - type: string - solver: - description: Solver contains the domain solving configuration that should - be used to solve this challenge resource. Only **one** of 'config' - or 'solver' may be specified, and if both are specified then no action - will be performed on the Challenge resource. - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure containing - the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure containing - the DNS configuration for Akamai DNS—Zone Record Management - API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a structure - containing the DNS configuration for DigitalOcean Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure containing - the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting RFC2136. - Required. Note: FQDN is not a valid value, only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the DNS supporting - RFC2136. Used only when ""tsigSecretSecretRef"" and ""tsigKeyName"" - are defined. Supported values are (case-insensitive): - ""HMACMD5"" (default), ""HMACSHA1"", ""HMACSHA256"" or - ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. If - ""tsigSecretSecretRef"" is defined, this field is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the TSIG - value. If ""tsigKeyName"" is defined, this field is required. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure containing - the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only this - zone in Route53 and will not do an lookup using the route53:ListHostedZonesByName - api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 provider - will assume using either the explicit credentials AccessKeyID/SecretAccessKey - or the inferred credentials from environment variables, - shared credentials file or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared credentials - file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies configuration - for a webhook DNS01 provider, including where to POST ChallengePayload - resources. - properties: - config: - description: Additional configuration that should be passed - to the webhook apiserver when challenges are processed. - This can contain arbitrary JSON data. Secret values should - not be specified in this stanza. If secret values are - needed (e.g. credentials for a DNS service), you should - use a SecretKeySelector to reference a Secret resource. - For details on the schema of this field, consult the webhook - provider implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used when - POSTing ChallengePayload resources to the webhook apiserver. - This should be the same as the GroupName specified in - the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined in - the webhook provider implementation. This will typically - be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration detailing - how to solve HTTP01 challenges within a Kubernetes cluster. Typically - this is accomplished through creating 'routes' of some description - that configure ingress controllers to direct traffic to 'solver - pods', which are responsible for responding to the ACME server's - HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver will - solve challenges by creating or modifying Ingress resources - in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating Ingress - resources to solve ACME challenges that use this challenge - solver. Only one of 'class' or 'name' may be specified. - type: string - name: - description: The name of the ingress resource that should - have ACME challenge solving routes inserted into it in - order to solve HTTP01 challenges. This is typically used - in conjunction with ingress controllers like ingress-gce, - which maintains a 1:1 mapping between external IPs and - ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure the - ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod used to - solve HTTP01 challenges. Only the 'labels' and 'annotations' - fields may be set. If labels or annotations overlap - with in-built values, the values here will override - the in-built values. - type: object - spec: - description: PodSpec defines overrides for the HTTP01 - challenge solver pod. Only the 'nodeSelector', 'affinity' - and 'tolerations' fields are supported currently. - All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node matches the corresponding - matchExpressions; the node(s) with the - highest sum are the most preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit - weight 0 (i.e. it's a no-op). A null - preferred scheduling term matches no - objects (i.e. is also a no-op). - properties: - preference: - description: A node selector term, - associated with the corresponding - weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with - matching the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to an update), the system may or may - not try to eventually evict the pod from - its node. - properties: - nodeSelectorTerms: - description: Required. A list of node - selector terms. The terms are ORed. - items: - description: A null or empty node - selector term matches no objects. - The requirements of them are ANDed. - The TopologySelectorTerm type implements - a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: The label key - that the selector applies - to. - type: string - operator: - description: Represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists, DoesNotExist. - Gt, and Lt. - type: string - values: - description: An array of - string values. If the - operator is In or NotIn, - the values array must - be non-empty. If the operator - is Exists or DoesNotExist, - the values array must - be empty. If the operator - is Gt or Lt, the values - array must have a single - element, which will be - interpreted as an integer. - This array is replaced - during a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - affinity expressions specified by this - field, but it may choose a node that violates - one or more of the expressions. The node - that is most preferred is the one with - the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a - sum by iterating through the elements - of this field and adding "weight" to the - sum if the node has pods which matches - the corresponding podAffinityTerm; the - node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the - same node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to - schedule pods to nodes that satisfy the - anti-affinity expressions specified by - this field, but it may choose a node that - violates one or more of the expressions. - The node that is most preferred is the - one with the greatest sum of weights, - i.e. for each node that meets all of the - scheduling requirements (resource request, - requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and - adding "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with the - highest sum are the most preferred. - items: - description: The weights of all of the - matched WeightedPodAffinityTerm fields - are added per-node to find the most - preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key and - values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to a - set of values. Valid - operators are In, - NotIn, Exists and - DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, the - values array must - be non-empty. If the - operator is Exists - or DoesNotExist, the - values array must - be empty. This array - is replaced during - a strategic merge - patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is - a map of {key,value} pairs. - A single {key,value} in - the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", - the operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be - co-located (affinity) or not - co-located (anti-affinity) with - the pods matching the labelSelector - in the specified namespaces, - where co-located is defined - as running on a node whose value - of the label with key topologyKey - matches that of any node on - which any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with - matching the corresponding podAffinityTerm, - in the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at - scheduling time, the pod will not be scheduled - onto the node. If the anti-affinity requirements - specified by this field cease to be met - at some point during pod execution (e.g. - due to a pod label update), the system - may or may not try to eventually evict - the pod from its node. When there are - multiple elements, the lists of nodes - corresponding to each podAffinityTerm - are intersected, i.e. all terms must be - satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this - pod should be co-located (affinity) - or not co-located (anti-affinity) with, - where co-located is defined as running - on a node whose value of the label with - key matches that of any - node on which a pod of the set of pods - is running - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector - which must match a node''s labels for the pod - to be scheduled on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached - to tolerates any taint that matches the triple - using the matching operator - . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the - toleration applies to. Empty means match - all taint keys. If the key is empty, operator - must be Exists; this combination means to - match all values and all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists - and Equal. Defaults to Equal. Exists is - equivalent to wildcard for value, so that - a pod can tolerate all taints of a particular - category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration (which - must be of effect NoExecute, otherwise this - field is ignored) tolerates the taint. By - default, it is not set, which means tolerate - the taint forever (do not evict). Zero and - negative values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the - toleration matches to. If the operator is - Exists, the value should be empty, otherwise - just a regular string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes solver - service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be used - to solve. If specified and a match is found, a dnsNames selector - will take precedence over a dnsZones selector. If multiple - solvers match with the same dnsNames value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be used - to solve. The most specific DNS zone match specified here - will take precedence over other DNS zone matches, so a solver - specifying sys.example.com will be selected over one specifying - example.com for the domain www.sys.example.com. If multiple - solvers match with the same dnsZones value, the solver with - the most matching labels in matchLabels will be selected. - If neither has more matches, the solver defined earlier in - the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the set - of certificate's that this challenge solver will apply to. - type: object - type: object - type: object - token: - description: Token is the ACME challenge token for this challenge. - type: string - type: - description: Type is the type of ACME challenge this resource represents, - e.g. "dns01" or "http01" - type: string - url: - description: URL is the URL of the ACME Challenge resource for this - challenge. This can be used to lookup details about the status of - this challenge. - type: string - wildcard: - description: Wildcard will be true if this challenge is for a wildcard - identifier, for example '*.example.com' - type: boolean - required: - - authzURL - - dnsName - - issuerRef - - key - - token - - type - - url - type: object - status: - properties: - presented: - description: Presented will be set to true if the challenge values for - this challenge are currently 'presented'. This *does not* imply the - self check is passing. Only that the values have been 'submitted' - for the appropriate challenge mechanism (i.e. the DNS01 TXT record - has been presented, or the HTTP01 configuration has been configured). - type: boolean - processing: - description: Processing is used to denote whether this challenge should - be processed or not. This field will only be set to true by the 'scheduling' - component. It will only be set to false by the 'challenges' controller, - after the challenge has reached a final state or timed out. If this - field is set to false, the challenge controller will not take any - more action. - type: boolean - reason: - description: Reason contains human readable information on why the Challenge - is in the current state. - type: string - state: - description: State contains the current 'state' of the challenge. If - not set, the state of the challenge is unknown. - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml deleted file mode 100644 index 7691a8e2fd..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: clusterissuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: ClusterIssuer - listKind: ClusterIssuerList - plural: clusterissuers - singular: clusterissuer - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml deleted file mode 100644 index d529bff171..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.cert-manager.io.yaml +++ /dev/null @@ -1,1655 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: issuers.cert-manager.io -spec: - group: cert-manager.io - names: - kind: Issuer - listKind: IssuerList - plural: issuers - singular: issuer - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: IssuerSpec is the specification of an Issuer. This includes - any configuration required for the issuer. - properties: - acme: - description: ACMEIssuer contains the specification for an ACME issuer - properties: - email: - description: Email is the email for this account - type: string - privateKeySecretRef: - description: PrivateKey is the name of a secret containing the private - key for this user account. - properties: - key: - description: The key of the secret to select from. Must be a - valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - server: - description: Server is the ACME server URL - type: string - skipTLSVerify: - description: If true, skip verifying the ACME server TLS certificate - type: boolean - solvers: - description: Solvers is a list of challenge solvers that will be - used to solve ACME challenges for the matching domains. - items: - properties: - dns01: - properties: - acmedns: - description: ACMEIssuerDNS01ProviderAcmeDNS is a structure - containing the configuration for ACME-DNS servers - properties: - accountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - host: - type: string - required: - - accountSecretRef - - host - type: object - akamai: - description: ACMEIssuerDNS01ProviderAkamai is a structure - containing the DNS configuration for Akamai DNS—Zone - Record Management API - properties: - accessTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - clientTokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - serviceConsumerDomain: - type: string - required: - - accessTokenSecretRef - - clientSecretSecretRef - - clientTokenSecretRef - - serviceConsumerDomain - type: object - azuredns: - description: ACMEIssuerDNS01ProviderAzureDNS is a structure - containing the configuration for Azure DNS - properties: - clientID: - type: string - clientSecretSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - environment: - enum: - - AzurePublicCloud - - AzureChinaCloud - - AzureGermanCloud - - AzureUSGovernmentCloud - type: string - hostedZoneName: - type: string - resourceGroupName: - type: string - subscriptionID: - type: string - tenantID: - type: string - required: - - clientID - - clientSecretSecretRef - - resourceGroupName - - subscriptionID - - tenantID - type: object - clouddns: - description: ACMEIssuerDNS01ProviderCloudDNS is a structure - containing the DNS configuration for Google Cloud DNS - properties: - project: - type: string - serviceAccountSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - project - - serviceAccountSecretRef - type: object - cloudflare: - description: ACMEIssuerDNS01ProviderCloudflare is a structure - containing the DNS configuration for Cloudflare - properties: - apiKeySecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - email: - type: string - required: - - apiKeySecretRef - - email - type: object - cnameStrategy: - description: CNAMEStrategy configures how the DNS01 provider - should handle CNAME records when found in DNS zones. - enum: - - None - - Follow - type: string - digitalocean: - description: ACMEIssuerDNS01ProviderDigitalOcean is a - structure containing the DNS configuration for DigitalOcean - Domains - properties: - tokenSecretRef: - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - tokenSecretRef - type: object - rfc2136: - description: ACMEIssuerDNS01ProviderRFC2136 is a structure - containing the configuration for RFC2136 DNS - properties: - nameserver: - description: 'The IP address of the DNS supporting - RFC2136. Required. Note: FQDN is not a valid value, - only IP.' - type: string - tsigAlgorithm: - description: 'The TSIG Algorithm configured in the - DNS supporting RFC2136. Used only when ""tsigSecretSecretRef"" - and ""tsigKeyName"" are defined. Supported values - are (case-insensitive): ""HMACMD5"" (default), ""HMACSHA1"", - ""HMACSHA256"" or ""HMACSHA512"".' - type: string - tsigKeyName: - description: The TSIG Key name configured in the DNS. - If ""tsigSecretSecretRef"" is defined, this field - is required. - type: string - tsigSecretSecretRef: - description: The name of the secret containing the - TSIG value. If ""tsigKeyName"" is defined, this - field is required. - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - nameserver - type: object - route53: - description: ACMEIssuerDNS01ProviderRoute53 is a structure - containing the Route 53 configuration for AWS - properties: - accessKeyID: - description: 'The AccessKeyID is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials' - type: string - hostedZoneID: - description: If set, the provider will manage only - this zone in Route53 and will not do an lookup using - the route53:ListHostedZonesByName api call. - type: string - region: - description: Always set the region when using AccessKeyID - and SecretAccessKey - type: string - role: - description: Role is a Role ARN which the Route53 - provider will assume using either the explicit credentials - AccessKeyID/SecretAccessKey or the inferred credentials - from environment variables, shared credentials file - or AWS Instance metadata - type: string - secretAccessKeySecretRef: - description: The SecretAccessKey is used for authentication. - If not set we fall-back to using env vars, shared - credentials file or AWS Instance metadata https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials - properties: - key: - description: The key of the secret to select from. - Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - required: - - name - type: object - required: - - region - type: object - webhook: - description: ACMEIssuerDNS01ProviderWebhook specifies - configuration for a webhook DNS01 provider, including - where to POST ChallengePayload resources. - properties: - config: - description: Additional configuration that should - be passed to the webhook apiserver when challenges - are processed. This can contain arbitrary JSON data. - Secret values should not be specified in this stanza. - If secret values are needed (e.g. credentials for - a DNS service), you should use a SecretKeySelector - to reference a Secret resource. For details on the - schema of this field, consult the webhook provider - implementation's documentation. - x-kubernetes-preserve-unknown-fields: true - groupName: - description: The API group name that should be used - when POSTing ChallengePayload resources to the webhook - apiserver. This should be the same as the GroupName - specified in the webhook provider implementation. - type: string - solverName: - description: The name of the solver to use, as defined - in the webhook provider implementation. This will - typically be the name of the provider, e.g. 'cloudflare'. - type: string - required: - - groupName - - solverName - type: object - type: object - http01: - description: ACMEChallengeSolverHTTP01 contains configuration - detailing how to solve HTTP01 challenges within a Kubernetes - cluster. Typically this is accomplished through creating - 'routes' of some description that configure ingress controllers - to direct traffic to 'solver pods', which are responsible - for responding to the ACME server's HTTP requests. - properties: - ingress: - description: The ingress based HTTP01 challenge solver - will solve challenges by creating or modifying Ingress - resources in order to route requests for '/.well-known/acme-challenge/XYZ' - to 'challenge solver' pods that are provisioned by cert-manager - for each Challenge to be completed. - properties: - class: - description: The ingress class to use when creating - Ingress resources to solve ACME challenges that - use this challenge solver. Only one of 'class' or - 'name' may be specified. - type: string - name: - description: The name of the ingress resource that - should have ACME challenge solving routes inserted - into it in order to solve HTTP01 challenges. This - is typically used in conjunction with ingress controllers - like ingress-gce, which maintains a 1:1 mapping - between external IPs and ingress resources. - type: string - podTemplate: - description: Optional pod template used to configure - the ACME challenge solver pods used for HTTP01 challenges - properties: - metadata: - description: ObjectMeta overrides for the pod - used to solve HTTP01 challenges. Only the 'labels' - and 'annotations' fields may be set. If labels - or annotations overlap with in-built values, - the values here will override the in-built values. - type: object - spec: - description: PodSpec defines overrides for the - HTTP01 challenge solver pod. Only the 'nodeSelector', - 'affinity' and 'tolerations' fields are supported - currently. All other fields will be ignored. - properties: - affinity: - description: If specified, the pod's scheduling - constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node matches the - corresponding matchExpressions; - the node(s) with the highest sum - are the most preferred. - items: - description: An empty preferred - scheduling term matches all objects - with implicit weight 0 (i.e. it's - a no-op). A null preferred scheduling - term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector - term, associated with the - corresponding weight. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated - with matching the corresponding - nodeSelectorTerm, in the range - 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to an update), the system - may or may not try to eventually - evict the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list - of node selector terms. The - terms are ORed. - items: - description: A null or empty - node selector term matches - no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of - the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node - selector requirements - by node's labels. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node - selector requirements - by node's fields. - items: - description: A node selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: The label - key that the selector - applies to. - type: string - operator: - description: Represents - a key's relationship - to a set of values. - Valid operators - are In, NotIn, Exists, - DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. If - the operator is - Gt or Lt, the values - array must have - a single element, - which will be interpreted - as an integer. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling - rules (e.g. co-locate this pod in the - same node, zone, etc. as some other - pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - affinity expressions, etc.), compute - a sum by iterating through the elements - of this field and adding "weight" - to the sum if the node has pods - which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements - specified by this field are not - met at scheduling time, the pod - will not be scheduled onto the node. - If the affinity requirements specified - by this field cease to be met at - some point during pod execution - (e.g. due to a pod label update), - the system may or may not try to - eventually evict the pod from its - node. When there are multiple elements, - the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity - scheduling rules (e.g. avoid putting - this pod in the same node, zone, etc. - as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer - to schedule pods to nodes that satisfy - the anti-affinity expressions specified - by this field, but it may choose - a node that violates one or more - of the expressions. The node that - is most preferred is the one with - the greatest sum of weights, i.e. - for each node that meets all of - the scheduling requirements (resource - request, requiredDuringScheduling - anti-affinity expressions, etc.), - compute a sum by iterating through - the elements of this field and adding - "weight" to the sum if the node - has pods which matches the corresponding - podAffinityTerm; the node(s) with - the highest sum are the most preferred. - items: - description: The weights of all - of the matched WeightedPodAffinityTerm - fields are added per-node to find - the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod - affinity term, associated - with the corresponding weight. - properties: - labelSelector: - description: A label query - over a set of resources, - in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label - selector requirements. - The requirements are - ANDed. - items: - description: A label - selector requirement - is a selector that - contains values, - a key, and an operator - that relates the - key and values. - properties: - key: - description: key - is the label - key that the - selector applies - to. - type: string - operator: - description: operator - represents a - key's relationship - to a set of - values. Valid - operators are - In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array - of string values. - If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or - DoesNotExist, - the values array - must be empty. - This array is - replaced during - a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels - map is equivalent - to an element of matchExpressions, - whose key field is - "key", the operator - is "In", and the values - array contains only - "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces - specifies which namespaces - the labelSelector applies - to (matches against); - null or empty list means - "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) - or not co-located (anti-affinity) - with the pods matching - the labelSelector in the - specified namespaces, - where co-located is defined - as running on a node whose - value of the label with - key topologyKey matches - that of any node on which - any of the selected pods - is running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated - with matching the corresponding - podAffinityTerm, in the range - 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity - requirements specified by this field - are not met at scheduling time, - the pod will not be scheduled onto - the node. If the anti-affinity requirements - specified by this field cease to - be met at some point during pod - execution (e.g. due to a pod label - update), the system may or may not - try to eventually evict the pod - from its node. When there are multiple - elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, - i.e. all terms must be satisfied. - items: - description: Defines a set of pods - (namely those matching the labelSelector - relative to the given namespace(s)) - that this pod should be co-located - (affinity) or not co-located (anti-affinity) - with, where co-located is defined - as running on a node whose value - of the label with key - matches that of any node on which - a pod of the set of pods is running - properties: - labelSelector: - description: A label query over - a set of resources, in this - case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, - a key, and an operator - that relates the key - and values. - properties: - key: - description: key is - the label key that - the selector applies - to. - type: string - operator: - description: operator - represents a key's - relationship to - a set of values. - Valid operators - are In, NotIn, Exists - and DoesNotExist. - type: string - values: - description: values - is an array of string - values. If the operator - is In or NotIn, - the values array - must be non-empty. - If the operator - is Exists or DoesNotExist, - the values array - must be empty. This - array is replaced - during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels - is a map of {key,value} - pairs. A single {key,value} - in the matchLabels map - is equivalent to an element - of matchExpressions, whose - key field is "key", the - operator is "In", and - the values array contains - only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); - null or empty list means "this - pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should - be co-located (affinity) or - not co-located (anti-affinity) - with the pods matching the - labelSelector in the specified - namespaces, where co-located - is defined as running on a - node whose value of the label - with key topologyKey matches - that of any node on which - any of the selected pods is - running. Empty topologyKey - is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which - must be true for the pod to fit on a node. - Selector which must match a node''s labels - for the pod to be scheduled on that node. - More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is - attached to tolerates any taint that matches - the triple using the - matching operator . - properties: - effect: - description: Effect indicates the taint - effect to match. Empty means match - all taint effects. When specified, - allowed values are NoSchedule, PreferNoSchedule - and NoExecute. - type: string - key: - description: Key is the taint key that - the toleration applies to. Empty means - match all taint keys. If the key is - empty, operator must be Exists; this - combination means to match all values - and all keys. - type: string - operator: - description: Operator represents a key's - relationship to the value. Valid operators - are Exists and Equal. Defaults to - Equal. Exists is equivalent to wildcard - for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents - the period of time the toleration - (which must be of effect NoExecute, - otherwise this field is ignored) tolerates - the taint. By default, it is not set, - which means tolerate the taint forever - (do not evict). Zero and negative - values will be treated as 0 (evict - immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value - the toleration matches to. If the - operator is Exists, the value should - be empty, otherwise just a regular - string. - type: string - type: object - type: array - type: object - type: object - serviceType: - description: Optional service type for Kubernetes - solver service - type: string - type: object - type: object - selector: - description: Selector selects a set of DNSNames on the Certificate - resource that should be solved using this challenge solver. - properties: - dnsNames: - description: List of DNSNames that this solver will be - used to solve. If specified and a match is found, a - dnsNames selector will take precedence over a dnsZones - selector. If multiple solvers match with the same dnsNames - value, the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - dnsZones: - description: List of DNSZones that this solver will be - used to solve. The most specific DNS zone match specified - here will take precedence over other DNS zone matches, - so a solver specifying sys.example.com will be selected - over one specifying example.com for the domain www.sys.example.com. - If multiple solvers match with the same dnsZones value, - the solver with the most matching labels in matchLabels - will be selected. If neither has more matches, the solver - defined earlier in the list will be selected. - items: - type: string - type: array - matchLabels: - additionalProperties: - type: string - description: A label selector that is used to refine the - set of certificate's that this challenge solver will - apply to. - type: object - type: object - type: object - type: array - required: - - privateKeySecretRef - - server - type: object - ca: - properties: - secretName: - description: SecretName is the name of the secret used to sign Certificates - issued by this Issuer. - type: string - required: - - secretName - type: object - selfSigned: - type: object - vault: - properties: - auth: - description: Vault authentication - properties: - appRole: - description: This Secret contains a AppRole and Secret - properties: - path: - description: Where the authentication path is mounted in - Vault. - type: string - roleId: - type: string - secretRef: - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - path - - roleId - - secretRef - type: object - kubernetes: - description: This contains a Role and Secret with a ServiceAccount - token to authenticate with vault. - properties: - mountPath: - description: The value here will be used as part of the - path used when authenticating with vault, for example - if you set a value of "foo", the path used will be "/v1/auth/foo/login". - If unspecified, the default value "kubernetes" will be - used. - type: string - role: - description: A required field containing the Vault Role - to assume. A Role binds a Kubernetes ServiceAccount with - a set of Vault policies. - type: string - secretRef: - description: The required Secret field containing a Kubernetes - ServiceAccount JWT used for authenticating with Vault. - Use of 'ambient credentials' is not supported. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - required: - - role - - secretRef - type: object - tokenSecretRef: - description: This Secret contains the Vault token key - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - type: object - caBundle: - description: Base64 encoded CA bundle to validate Vault server certificate. - Only used if the Server URL is using HTTPS protocol. This parameter - is ignored for plain HTTP protocol connection. If not set the - system root certificates are used to validate the TLS connection. - format: byte - type: string - path: - description: Vault URL path to the certificate role - type: string - server: - description: Server is the vault connection address - type: string - required: - - auth - - path - - server - type: object - venafi: - description: VenafiIssuer describes issuer configuration details for - Venafi Cloud. - properties: - cloud: - description: Cloud specifies the Venafi cloud configuration settings. - Only one of TPP or Cloud may be specified. - properties: - apiTokenSecretRef: - description: APITokenSecretRef is a secret key selector for - the Venafi Cloud API token. - properties: - key: - description: The key of the secret to select from. Must - be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for Venafi Cloud - type: string - required: - - apiTokenSecretRef - - url - type: object - tpp: - description: TPP specifies Trust Protection Platform configuration - settings. Only one of TPP or Cloud may be specified. - properties: - caBundle: - description: CABundle is a PEM encoded TLS certifiate to use - to verify connections to the TPP instance. If specified, system - roots will not be used and the issuing CA for the TPP instance - must be verifiable using the provided root. If not specified, - the connection will be verified using the cert-manager system - root certificates. - format: byte - type: string - credentialsRef: - description: CredentialsRef is a reference to a Secret containing - the username and password for the TPP server. The secret must - contain two keys, 'username' and 'password'. - properties: - name: - description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, uid?' - type: string - required: - - name - type: object - url: - description: URL is the base URL for the Venafi TPP instance - type: string - required: - - credentialsRef - - url - type: object - zone: - description: Zone is the Venafi Policy Zone to use for this issuer. - All requests made to the Venafi platform will be restricted by - the named zone policy. This field is required. - type: string - required: - - zone - type: object - type: object - status: - description: IssuerStatus contains status information about an Issuer - properties: - acme: - properties: - lastRegisteredEmail: - description: LastRegisteredEmail is the email associated with the - latest registered ACME account, in order to track changes made - to registered account associated with the Issuer - type: string - uri: - description: URI is the unique account identifier, which can also - be used to retrieve account details from the CA - type: string - type: object - conditions: - items: - description: IssuerCondition contains condition information for an - Issuer. - properties: - lastTransitionTime: - description: LastTransitionTime is the timestamp corresponding - to the last status change of this condition. - format: date-time - type: string - message: - description: Message is a human readable description of the details - of the last transition, complementing reason. - type: string - reason: - description: Reason is a brief machine readable explanation for - the condition's last transition. - type: string - status: - description: Status of the condition, one of ('True', 'False', - 'Unknown'). - enum: - - "True" - - "False" - - Unknown - type: string - type: - description: Type of the condition, currently ('Ready'). - type: string - required: - - status - - type - type: object - type: array - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml deleted file mode 100644 index 12b262c51e..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.acme.cert-manager.io.yaml +++ /dev/null @@ -1,200 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - name: orders.acme.cert-manager.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: CreationTimestamp is a timestamp representing the server time when - this object was created. It is not guaranteed to be set in happens-before order - across separate operations. Clients may not set this value. It is represented - in RFC3339 form and is in UTC. - name: Age - type: date - group: acme.cert-manager.io - names: - kind: Order - listKind: OrderList - plural: orders - singular: order - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: Order is a type to represent an Order with an ACME server - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - commonName: - description: CommonName is the common name as specified on the DER encoded - CSR. If CommonName is not specified, the first DNSName specified will - be used as the CommonName. At least one of CommonName or a DNSNames - must be set. This field must match the corresponding field on the - DER encoded CSR. - type: string - csr: - description: Certificate signing request bytes in DER encoding. This - will be used when finalizing the order. This field must be set on - the order. - format: byte - type: string - dnsNames: - description: DNSNames is a list of DNS names that should be included - as part of the Order validation process. If CommonName is not specified, - the first DNSName specified will be used as the CommonName. At least - one of CommonName or a DNSNames must be set. This field must match - the corresponding field on the DER encoded CSR. - items: - type: string - type: array - issuerRef: - description: IssuerRef references a properly configured ACME-type Issuer - which should be used to create this Order. If the Issuer does not - exist, processing will be retried. If the Issuer is not an 'ACME' - Issuer, an error will be returned and the Order will be marked as - failed. - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - name - type: object - required: - - csr - - issuerRef - type: object - status: - properties: - authorizations: - description: Authorizations contains data returned from the ACME server - on what authoriations must be completed in order to validate the DNS - names specified on the Order. - items: - description: ACMEAuthorization contains data returned from the ACME - server on an authorization that must be completed in order validate - a DNS name on an ACME Order resource. - properties: - challenges: - description: Challenges specifies the challenge types offered - by the ACME server. One of these challenge types will be selected - when validating the DNS name and an appropriate Challenge resource - will be created to perform the ACME challenge process. - items: - description: Challenge specifies a challenge offered by the - ACME server for an Order. An appropriate Challenge resource - can be created to perform the ACME challenge process. - properties: - token: - description: Token is the token that must be presented for - this challenge. This is used to compute the 'key' that - must also be presented. - type: string - type: - description: Type is the type of challenge being offered, - e.g. http-01, dns-01 - type: string - url: - description: URL is the URL of this challenge. It can be - used to retrieve additional metadata about the Challenge - from the ACME server. - type: string - required: - - token - - type - - url - type: object - type: array - identifier: - description: Identifier is the DNS name to be validated as part - of this authorization - type: string - url: - description: URL is the URL of the Authorization that must be - completed - type: string - wildcard: - description: Wildcard will be true if this authorization is for - a wildcard DNS name. If this is true, the identifier will be - the *non-wildcard* version of the DNS name. For example, if - '*.example.com' is the DNS name being validated, this field - will be 'true' and the 'identifier' field will be 'example.com'. - type: boolean - required: - - url - type: object - type: array - certificate: - description: Certificate is a copy of the PEM encoded certificate for - this Order. This field will be populated after the order has been - successfully finalized with the ACME server, and the order has transitioned - to the 'valid' state. - format: byte - type: string - failureTime: - description: FailureTime stores the time that this order failed. This - is used to influence garbage collection and back-off. - format: date-time - type: string - finalizeURL: - description: FinalizeURL of the Order. This is used to obtain certificates - for this order once it has been completed. - type: string - reason: - description: Reason optionally provides more information about a why - the order is in the current state. - type: string - state: - description: State contains the current state of this Order resource. - States 'success' and 'expired' are 'final' - enum: - - valid - - ready - - pending - - processing - - invalid - - expired - - errored - type: string - url: - description: URL of the Order. This will initially be empty when the - resource is first created. The Order controller will populate this - field when the Order is first processed. This field will be immutable - after it is initially set. - type: string - type: object - required: - - metadata - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomize_test.go b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomize_test.go deleted file mode 100644 index 47a5ca433f..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager_kube_system_resources - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/cert-manager-kube-system-resources", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index c37a3b7497..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml deleted file mode 100644 index 542fbcbd59..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - create - - update - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml deleted file mode 100644 index a47a2fe74f..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-cainjector:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cainjector - kustomize.component: cert-manager - name: cert-manager-cainjector:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager-cainjector:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml deleted file mode 100644 index f7ec38a254..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager-webhook:webhook-authentication-reader.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: webhook - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-authentication-reader - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: extension-apiserver-authentication-reader -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml deleted file mode 100644 index 25a7fde904..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_cert-manager:leaderelection.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: cert-manager - kustomize.component: cert-manager - name: cert-manager:leaderelection - namespace: kube-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: cert-manager:leaderelection -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml b/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml deleted file mode 100644 index 14492eacf8..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager-kube-system-resources/test_data/expected/~g_v1_configmap_cert-manager-kube-params-parameters.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - certManagerNamespace: cert-manager -kind: ConfigMap -metadata: - annotations: {} - labels: - kustomize.component: cert-manager - name: cert-manager-kube-params-parameters - namespace: kube-system diff --git a/tests/tests/legacy_kustomizations/cert-manager/kustomize_test.go b/tests/tests/legacy_kustomizations/cert-manager/kustomize_test.go deleted file mode 100644 index dc67bd9b5a..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cert_manager - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/cert-manager", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index c01b68cdc7..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/mutations - failurePolicy: Fail - name: webhook.cert-manager.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - orders - - challenges - - certificaterequests diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml deleted file mode 100644 index b1c373f59e..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_cert-manager-webhook.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-apiserver-ca: "true" - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook -webhooks: -- clientConfig: - caBundle: "" - service: - name: kubernetes - namespace: default - path: /apis/webhook.cert-manager.io/v1beta1/validations - failurePolicy: Fail - name: webhook.certmanager.k8s.io - rules: - - apiGroups: - - cert-manager.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - certificates - - issuers - - clusterissuers - - certificaterequests - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml deleted file mode 100644 index 1653f6acf7..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apiregistration.k8s.io_v1beta1_apiservice_v1beta1.webhook.cert-manager.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiregistration.k8s.io/v1beta1 -kind: APIService -metadata: - annotations: - cert-manager.io/inject-ca-from-secret: cert-manager/cert-manager-webhook-tls - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: v1beta1.webhook.cert-manager.io -spec: - group: webhook.cert-manager.io - groupPriorityMinimum: 1000 - service: - name: cert-manager-webhook - namespace: cert-manager - version: v1beta1 - versionPriority: 15 diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml deleted file mode 100644 index 1631206b39..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/app.k8s.io_v1beta1_application_cert-manager.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - addOwnerRef: true - componentKinds: - - group: rbac - kind: ClusterRole - - group: rbac - kind: ClusterRoleBinding - - group: core - kind: Namespace - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: Automatically provision and manage TLS certificates in Kubernetes - https://jetstack.io. - keywords: - - cert-manager - links: - - description: About - url: https://github.com/jetstack/cert-manager - type: "" - version: v0.10.0 - selector: - matchLabels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml deleted file mode 100644 index c0e85bc85a..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-cainjector.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --leader-election-namespace=kube-system - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-cainjector:v0.11.0 - imagePullPolicy: IfNotPresent - name: cainjector - resources: {} - serviceAccountName: cert-manager-cainjector diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml deleted file mode 100644 index 89fcb019e5..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager-webhook.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - template: - metadata: - annotations: null - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --secure-port=6443 - - --tls-cert-file=/certs/tls.crt - - --tls-private-key-file=/certs/tls.key - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-webhook:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - resources: {} - volumeMounts: - - mountPath: /certs - name: certs - serviceAccountName: cert-manager-webhook - volumes: - - name: certs - secret: - secretName: cert-manager-webhook-tls diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml deleted file mode 100644 index d02d88b23f..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/apps_v1_deployment_cert-manager.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - replicas: 1 - selector: - matchLabels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "9402" - prometheus.io/scrape: "true" - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - spec: - containers: - - args: - - --v=2 - - --cluster-resource-namespace=$(POD_NAMESPACE) - - --leader-election-namespace=kube-system - - --webhook-namespace=$(POD_NAMESPACE) - - --webhook-ca-secret=cert-manager-webhook-ca - - --webhook-serving-secret=cert-manager-webhook-tls - - --webhook-dns-names=cert-manager-webhook,cert-manager-webhook.cert-manager,cert-manager-webhook.cert-manager.svc - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: quay.io/jetstack/cert-manager-controller:v0.11.0 - imagePullPolicy: IfNotPresent - name: cert-manager - ports: - - containerPort: 9402 - resources: - requests: - cpu: 10m - memory: 32Mi - serviceAccountName: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml deleted file mode 100644 index 0f28dabc7e..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/cert-manager.io_v1alpha2_clusterissuer_kubeflow-self-signing-issuer.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: ClusterIssuer -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: kubeflow-self-signing-issuer - namespace: cert-manager -spec: - selfSigned: {} diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml deleted file mode 100644 index 8a24fd90d3..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-edit.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: cert-manager-edit -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml deleted file mode 100644 index 410043be74..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-view.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - rbac.authorization.k8s.io/aggregate-to-admin: "true" - rbac.authorization.k8s.io/aggregate-to-edit: "true" - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: cert-manager-view -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml deleted file mode 100644 index 22f98cb528..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_cert-manager-webhook:webhook-requester.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook:webhook-requester -rules: -- apiGroups: - - admission.cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - create diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml deleted file mode 100644 index efe7e5313a..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-cainjector.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-cainjector -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - create - - update - - patch -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiregistration.k8s.io - resources: - - apiservices - verbs: - - get - - list - - watch - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch - - update diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml deleted file mode 100644 index 26718241b3..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,68 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-certificates -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificates/status - - certificaterequests - - certificaterequests/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - certificates/finalizers - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - verbs: - - create - - delete - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml deleted file mode 100644 index 2dad24ab8a..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-challenges -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - - challenges/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - pods - - services - verbs: - - get - - list - - watch - - create - - delete -- apiGroups: - - extensions - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch - - create - - delete - - update -- apiGroups: - - acme.cert-manager.io - resources: - - challenges/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index 5d5abe5fec..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -rules: -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - clusterissuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 428d075d49..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -rules: -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - verbs: - - create - - update - - delete -- apiGroups: - - cert-manager.io - resources: - - certificates - - certificaterequests - - issuers - - clusterissuers - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io/v1 - resources: - - ingresses/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml deleted file mode 100644 index b6381271de..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-issuers -rules: -- apiGroups: - - cert-manager.io - resources: - - issuers - - issuers/status - verbs: - - update -- apiGroups: - - cert-manager.io - resources: - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - delete -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml deleted file mode 100644 index c745713125..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,67 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-orders -rules: -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - orders/status - verbs: - - update -- apiGroups: - - acme.cert-manager.io - resources: - - orders - - challenges - verbs: - - get - - list - - watch -- apiGroups: - - cert-manager.io - resources: - - clusterissuers - - issuers - verbs: - - get - - list - - watch -- apiGroups: - - acme.cert-manager.io - resources: - - challenges - verbs: - - create - - delete -- apiGroups: - - acme.cert-manager.io - resources: - - orders/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml deleted file mode 100644 index cb33f599c1..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-cainjector.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-cainjector -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-cainjector -subjects: -- kind: ServiceAccount - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml deleted file mode 100644 index 644a47fabe..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-certificates.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-certificates -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-certificates -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml deleted file mode 100644 index 3fdd9bafb1..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-challenges.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-challenges -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-challenges -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml deleted file mode 100644 index 5ced006089..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-clusterissuers.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-clusterissuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-clusterissuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml deleted file mode 100644 index 343b8ae1e5..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-ingress-shim.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-ingress-shim -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-ingress-shim -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml deleted file mode 100644 index b80414ccdb..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-issuers.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-issuers -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-issuers -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml deleted file mode 100644 index a20b0d2651..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-controller-orders.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-controller-orders -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cert-manager-controller-orders -subjects: -- kind: ServiceAccount - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml deleted file mode 100644 index 8431859475..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cert-manager-webhook:auth-delegator.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook:auth-delegator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: system:auth-delegator -subjects: -- apiGroup: "" - kind: ServiceAccount - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml deleted file mode 100644 index 8ade06b86a..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_configmap_cert-manager-parameters.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -data: - namespace: cert-manager -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-parameters - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml deleted file mode 100644 index 97bcdd86b1..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_namespace_cert-manager.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml deleted file mode 100644 index 7ed6f443a0..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager-webhook.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager -spec: - ports: - - name: https - port: 443 - targetPort: 6443 - selector: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml deleted file mode 100644 index 10688a2de0..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_service_cert-manager.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager -spec: - ports: - - port: 9402 - protocol: TCP - targetPort: 9402 - selector: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml deleted file mode 100644 index f4edf9d23f..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-cainjector.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cainjector - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-cainjector - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml deleted file mode 100644 index c1bc2cad33..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager-webhook.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: webhook - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager-webhook - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml b/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml deleted file mode 100644 index eb4092bde9..0000000000 --- a/tests/tests/legacy_kustomizations/cert-manager/test_data/expected/~g_v1_serviceaccount_cert-manager.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cert-manager - app.kubernetes.io/component: cert-manager - app.kubernetes.io/instance: cert-manager-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cert-manager - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cert-manager - name: cert-manager - namespace: cert-manager diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/kustomize_test.go b/tests/tests/legacy_kustomizations/cloud-endpoints/kustomize_test.go deleted file mode 100644 index 05836cca07..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package cloud_endpoints - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/cloud-endpoints", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudendpoints.ctl.isla.solutions.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudendpoints.ctl.isla.solutions.yaml deleted file mode 100644 index 431f065e96..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudendpoints.ctl.isla.solutions.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloudendpoints.ctl.isla.solutions -spec: - group: ctl.isla.solutions - names: - kind: CloudEndpoint - plural: cloudendpoints - shortNames: - - cloudep - - ce - singular: cloudendpoint - scope: Namespaced - version: v1 diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/app.k8s.io_v1beta1_application_cloud-endpoints.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/app.k8s.io_v1beta1_application_cloud-endpoints.yaml deleted file mode 100644 index 8b282ef9d4..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/app.k8s.io_v1beta1_application_cloud-endpoints.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: cloud-endpoints - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - cloud-endpoints - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: cloud-endpoints - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apps_v1_deployment_cloud-endpoints-controller.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apps_v1_deployment_cloud-endpoints-controller.yaml deleted file mode 100644 index 38983cbc63..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/apps_v1_deployment_cloud-endpoints-controller.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - spec: - containers: - - image: gcr.io/cloud-solutions-group/cloud-endpoints-controller:0.2.1 - imagePullPolicy: Always - name: cloud-endpoints-controller - readinessProbe: - failureThreshold: 2 - httpGet: - path: /healthz - port: 80 - scheme: HTTP - periodSeconds: 5 - successThreshold: 1 - timeoutSeconds: 5 - serviceAccountName: kf-admin - terminationGracePeriodSeconds: 5 diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_cloud-endpoints-controller.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_cloud-endpoints-controller.yaml deleted file mode 100644 index a211ed8933..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/metacontroller.k8s.io_v1alpha1_compositecontroller_cloud-endpoints-controller.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: metacontroller.k8s.io/v1alpha1 -kind: CompositeController -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-controller - namespace: kubeflow -spec: - childResources: [] - clientConfig: - service: - caBundle: '...' - name: cloud-endpoints-controller - namespace: kubeflow - generateSelector: true - hooks: - sync: - webhook: - url: http://cloud-endpoints-controller.kubeflow/sync - parentResource: - apiVersion: ctl.isla.solutions/v1 - resource: cloudendpoints - resyncPeriodSeconds: 2 diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cloud-endpoints-controller.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cloud-endpoints-controller.yaml deleted file mode 100644 index 474adfb6dd..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_cloud-endpoints-controller.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-controller -rules: -- apiGroups: - - "" - resources: - - services - - configmaps - verbs: - - get - - list -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - get - - list diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cloud-endpoints-controller.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cloud-endpoints-controller.yaml deleted file mode 100644 index 3974b4ee45..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_cloud-endpoints-controller.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cloud-endpoints-controller -subjects: -- kind: ServiceAccount - name: kf-admin - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_configmap_cloud-endpoints-parameters.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_configmap_cloud-endpoints-parameters.yaml deleted file mode 100644 index 57607fd3f4..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_configmap_cloud-endpoints-parameters.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - namespace: kubeflow - secretName: admin-gcp-sa -kind: ConfigMap -metadata: - annotations: {} - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_service_cloud-endpoints-controller.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_service_cloud-endpoints-controller.yaml deleted file mode 100644 index 78020c9b98..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_service_cloud-endpoints-controller.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: cloud-endpoints-controller - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - selector: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml b/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml deleted file mode 100644 index b96fa3b16d..0000000000 --- a/tests/tests/legacy_kustomizations/cloud-endpoints/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: cloud-endpoints-controller - app.kubernetes.io/component: cloud-endpoints - app.kubernetes.io/instance: cloud-endpoints-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: cloud-endpoints - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: cloud-endpoints - name: kf-admin - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/default-install/kustomize_test.go b/tests/tests/legacy_kustomizations/default-install/kustomize_test.go deleted file mode 100644 index bc1c186f55..0000000000 --- a/tests/tests/legacy_kustomizations/default-install/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package default_install - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/default-install", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/default-install/test_data/expected/kubeflow.org_v1beta1_profile_kubeflow-jlewi.yaml b/tests/tests/legacy_kustomizations/default-install/test_data/expected/kubeflow.org_v1beta1_profile_kubeflow-jlewi.yaml deleted file mode 100644 index 9098b5ace2..0000000000 --- a/tests/tests/legacy_kustomizations/default-install/test_data/expected/kubeflow.org_v1beta1_profile_kubeflow-jlewi.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kubeflow.org/v1beta1 -kind: Profile -metadata: - name: kubeflow-jlewi - namespace: kubeflow -spec: - owner: - kind: User - name: jlewi@google.com diff --git a/tests/tests/legacy_kustomizations/default-install/test_data/expected/~g_v1_configmap_default-install-config-6mcgbmmtg6.yaml b/tests/tests/legacy_kustomizations/default-install/test_data/expected/~g_v1_configmap_default-install-config-6mcgbmmtg6.yaml deleted file mode 100644 index 7639ecccef..0000000000 --- a/tests/tests/legacy_kustomizations/default-install/test_data/expected/~g_v1_configmap_default-install-config-6mcgbmmtg6.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - profile-name: kubeflow-jlewi - user: jlewi@google.com -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: default-install-config-6mcgbmmtg6 - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/gpu-driver/kustomize_test.go b/tests/tests/legacy_kustomizations/gpu-driver/kustomize_test.go deleted file mode 100644 index 66a2e2ab40..0000000000 --- a/tests/tests/legacy_kustomizations/gpu-driver/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package gpu_driver - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/gpu-driver", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/app.k8s.io_v1beta1_application_gpu-driver.yaml b/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/app.k8s.io_v1beta1_application_gpu-driver.yaml deleted file mode 100644 index 43fdef3caa..0000000000 --- a/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/app.k8s.io_v1beta1_application_gpu-driver.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: gpu-driver - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - gpu-driver - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: gpu-driver - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/apps_v1_daemonset_nvidia-driver-installer.yaml b/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/apps_v1_daemonset_nvidia-driver-installer.yaml deleted file mode 100644 index 88f0d294a6..0000000000 --- a/tests/tests/legacy_kustomizations/gpu-driver/test_data/expected/apps_v1_daemonset_nvidia-driver-installer.yaml +++ /dev/null @@ -1,84 +0,0 @@ -apiVersion: apps/v1 -kind: DaemonSet -metadata: - labels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - k8s-app: nvidia-driver-installer - kustomize.component: gpu-driver - name: nvidia-driver-installer - namespace: kubeflow -spec: - selector: - matchLabels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: gpu-driver - template: - metadata: - labels: - app.kubernetes.io/component: gpu-driver - app.kubernetes.io/instance: gpu-driver-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: gpu-driver - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - k8s-app: nvidia-driver-installer - kustomize.component: gpu-driver - name: nvidia-driver-installer - spec: - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: cloud.google.com/gke-accelerator - operator: Exists - containers: - - image: gcr.io/google-containers/pause:2.0 - name: pause - hostNetwork: true - hostPID: true - initContainers: - - env: - - name: NVIDIA_INSTALL_DIR_HOST - value: /home/kubernetes/bin/nvidia - - name: NVIDIA_INSTALL_DIR_CONTAINER - value: /usr/local/nvidia - - name: ROOT_MOUNT_DIR - value: /root - image: cos-nvidia-installer:fixed - imagePullPolicy: Never - name: nvidia-driver-installer - resources: - requests: - cpu: 0.15 - securityContext: - privileged: true - volumeMounts: - - mountPath: /usr/local/nvidia - name: nvidia-install-dir-host - - mountPath: /dev - name: dev - - mountPath: /root - name: root-mount - tolerations: - - operator: Exists - volumes: - - hostPath: - path: /dev - name: dev - - hostPath: - path: /home/kubernetes/bin/nvidia - name: nvidia-install-dir-host - - hostPath: - path: / - name: root-mount diff --git a/tests/tests/legacy_kustomizations/iap-ingress/kustomize_test.go b/tests/tests/legacy_kustomizations/iap-ingress/kustomize_test.go deleted file mode 100644 index f53ce98460..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package iap_ingress - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/iap-ingress", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/app.k8s.io_v1beta1_application_iap-ingress.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/app.k8s.io_v1beta1_application_iap-ingress.yaml deleted file mode 100644 index 18298a5485..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/app.k8s.io_v1beta1_application_iap-ingress.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: iap-ingress - namespace: istio-system -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - iap-ingress - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: iap-ingress - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_iap-enabler.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_iap-enabler.yaml deleted file mode 100644 index 2c9a2921f5..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_iap-enabler.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: iap-enabler - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - template: - metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - service: iap-enabler - spec: - containers: - - command: - - bash - - /var/envoy-config/setup_backend.sh - env: - - name: NAMESPACE - value: istio-system - - name: SERVICE - value: istio-ingressgateway - - name: INGRESS_NAME - value: envoy-ingress - - name: ENVOY_ADMIN - value: http://localhost:8001 - - name: USE_ISTIO - value: "true" - image: gcr.io/kubeflow-images-public/ingress-setup:latest - name: iap - volumeMounts: - - mountPath: /var/envoy-config/ - name: config-volume - restartPolicy: Always - serviceAccountName: kf-admin - volumes: - - configMap: - name: envoy-config - name: config-volume diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_whoami-app.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_whoami-app.yaml deleted file mode 100644 index 13121c0353..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_deployment_whoami-app.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: whoami-app - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - template: - metadata: - labels: - app: whoami - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - spec: - containers: - - env: - - name: PORT - value: "8081" - image: gcr.io/cloud-solutions-group/esp-sample-app:1.0.0 - name: app - ports: - - containerPort: 8081 - readinessProbe: - failureThreshold: 2 - httpGet: - path: /healthz - port: 8081 - scheme: HTTP - periodSeconds: 10 - successThreshold: 1 - timeoutSeconds: 5 diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_statefulset_backend-updater.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_statefulset_backend-updater.yaml deleted file mode 100644 index 7a78cc2e74..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/apps_v1_statefulset_backend-updater.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - service: backend-updater - name: backend-updater - namespace: istio-system -spec: - selector: - matchLabels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - service: backend-updater - serviceName: backend-updater - template: - metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - service: backend-updater - spec: - containers: - - command: - - bash - - /var/envoy-config/update_backend.sh - env: - - name: NAMESPACE - value: istio-system - - name: SERVICE - value: istio-ingressgateway - - name: INGRESS_NAME - value: envoy-ingress - - name: USE_ISTIO - value: "true" - image: gcr.io/kubeflow-images-public/ingress-setup:latest - name: backend-updater - volumeMounts: - - mountPath: /var/envoy-config/ - name: config-volume - serviceAccountName: kf-admin - volumes: - - configMap: - name: envoy-config - name: config-volume - volumeClaimTemplates: [] diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/authentication.istio.io_v1alpha1_policy_ingress-jwt.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/authentication.istio.io_v1alpha1_policy_ingress-jwt.yaml deleted file mode 100644 index 59950a82bb..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/authentication.istio.io_v1alpha1_policy_ingress-jwt.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: authentication.istio.io/v1alpha1 -kind: Policy -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: ingress-jwt - namespace: istio-system -spec: - origins: - - jwt: - audiences: - - TO_BE_PATCHED - issuer: https://cloud.google.com/iap - jwksUri: https://www.gstatic.com/iap/verify/public_key-jwk - jwtHeaders: - - x-goog-iap-jwt-assertion - trigger_rules: - - excluded_paths: - - exact: /healthz/ready - principalBinding: USE_ORIGIN - targets: - - name: istio-ingressgateway - ports: - - number: 80 diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/cloud.google.com_v1beta1_backendconfig_iap-backendconfig.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/cloud.google.com_v1beta1_backendconfig_iap-backendconfig.yaml deleted file mode 100644 index 5448d4ddf0..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/cloud.google.com_v1beta1_backendconfig_iap-backendconfig.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: cloud.google.com/v1beta1 -kind: BackendConfig -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: iap-backendconfig - namespace: istio-system -spec: - iap: - enabled: true - oauthclientCredentials: - secretName: kubeflow-oauth - timeoutSec: 3600 diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/ctl.isla.solutions_v1_cloudendpoint_kf-v1-0210.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/ctl.isla.solutions_v1_cloudendpoint_kf-v1-0210.yaml deleted file mode 100644 index c42dc340fc..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/ctl.isla.solutions_v1_cloudendpoint_kf-v1-0210.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: ctl.isla.solutions/v1 -kind: CloudEndpoint -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: kf-v1-0210 - namespace: istio-system -spec: - project: jlewi-dev - targetIngress: - name: envoy-ingress - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.gke.io_v1beta1_managedcertificate_gke-certificate.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.gke.io_v1beta1_managedcertificate_gke-certificate.yaml deleted file mode 100644 index f42a18d952..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.gke.io_v1beta1_managedcertificate_gke-certificate.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: networking.gke.io/v1beta1 -kind: ManagedCertificate -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: gke-certificate - namespace: istio-system -spec: - domains: - - kf-v1-0210.endpoints.jlewi-dev.cloud.goog diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.k8s.io_v1beta1_ingress_envoy-ingress.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.k8s.io_v1beta1_ingress_envoy-ingress.yaml deleted file mode 100644 index aedd30c564..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/networking.k8s.io_v1beta1_ingress_envoy-ingress.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: networking.k8s.io/v1beta1 -kind: Ingress -metadata: - annotations: - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: kf-v1-0210-ip - networking.gke.io/managed-certificates: gke-certificate - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: envoy-ingress - namespace: istio-system -spec: - backend: - serviceName: istio-ingressgateway - servicePort: 80 - rules: - - host: kf-v1-0210.endpoints.jlewi-dev.cloud.goog - http: - paths: - - backend: - serviceName: istio-ingressgateway - servicePort: 80 - path: /* diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_kf-admin-iap.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_kf-admin-iap.yaml deleted file mode 100644 index 138a55ed11..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_kf-admin-iap.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: kf-admin-iap -rules: -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - get - - list - - patch - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - get - - list - - update - - patch -- apiGroups: - - authentication.istio.io - resources: - - policies - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - gateways - - virtualservices - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_kf-admin-iap.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_kf-admin-iap.yaml deleted file mode 100644 index aa55cffe0b..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_kf-admin-iap.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: kf-admin-iap -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kf-admin-iap -subjects: -- kind: ServiceAccount - name: kf-admin - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_envoy-config.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_envoy-config.yaml deleted file mode 100644 index c1634bc1f0..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_envoy-config.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: v1 -data: - healthcheck_route.yaml: | - apiVersion: networking.istio.io/v1alpha3 - kind: VirtualService - metadata: - name: default-routes - namespace: istio-system - spec: - hosts: - - "*" - gateways: - - kubeflow-gateway - http: - - match: - - uri: - exact: /healthz - route: - - destination: - port: - number: 80 - host: whoami-app.kubeflow.svc.cluster.local - - match: - - uri: - exact: /whoami - route: - - destination: - port: - number: 80 - host: whoami-app.kubeflow.svc.cluster.local - --- - apiVersion: networking.istio.io/v1alpha3 - kind: Gateway - metadata: - name: kubeflow-gateway - namespace: istio-system - spec: - selector: - istio: ingressgateway - servers: - - port: - number: 80 - name: http - protocol: HTTP - hosts: - - "*" - setup_backend.sh: "#!/usr/bin/env bash\n#\n# A simple shell script to configure - the JWT audience used with ISTIO\nset -x\n[ -z ${NAMESPACE} ] && echo Error NAMESPACE - must be set && exit 1\n[ -z ${SERVICE} ] && echo Error SERVICE must be set && - exit 1\n[ -z ${INGRESS_NAME} ] && echo Error INGRESS_NAME must be set && exit - 1\n\nPROJECT=$(curl -s -H \"Metadata-Flavor: Google\" http://metadata.google.internal/computeMetadata/v1/project/project-id)\nif - [ -z ${PROJECT} ]; then\n echo Error unable to fetch PROJECT from compute metadata\n - \ exit 1\nfi\n\nPROJECT_NUM=$(curl -s -H \"Metadata-Flavor: Google\" http://metadata.google.internal/computeMetadata/v1/project/numeric-project-id)\nif - [ -z ${PROJECT_NUM} ]; then\n echo Error unable to fetch PROJECT_NUM from compute - metadata\n exit 1\nfi\n\n# Activate the service account\nif [ ! -z \"${GOOGLE_APPLICATION_CREDENTIALS}\" - ]; then\n # As of 0.7.0 we should be using workload identity and never setting - GOOGLE_APPLICATION_CREDENTIALS.\n # But we kept this for backwards compatibility - but can remove later.\n gcloud auth activate-service-account --key-file=${GOOGLE_APPLICATION_CREDENTIALS}\nfi\n\n# - Print out the config for debugging\ngcloud config list\ngcloud auth list\n\nset_jwt_policy - () {\n NODE_PORT=$(kubectl --namespace=${NAMESPACE} get svc ${SERVICE} -o jsonpath='{.spec.ports[?(@.name==\"http2\")].nodePort}')\n - \ echo \"node port is ${NODE_PORT}\"\n\n BACKEND_NAME=\"\"\n while [[ -z ${BACKEND_NAME} - ]]; do\n BACKENDS=$(kubectl --namespace=${NAMESPACE} get ingress ${INGRESS_NAME} - -o jsonpath='{.metadata.annotations.ingress\\.kubernetes\\.io/backends}')\n echo - \"fetching backends info with ${INGRESS_NAME}: ${BACKENDS}\"\n BACKEND_NAME=$(echo - $BACKENDS | grep -o \"k8s-be-${NODE_PORT}--[0-9a-z]\\+\")\n echo \"backend - name is ${BACKEND_NAME}\"\n sleep 2\n done\n\n BACKEND_ID=\"\"\n while [[ - -z ${BACKEND_ID} ]]; do\n BACKEND_ID=$(gcloud compute --project=${PROJECT} - backend-services list --filter=name~${BACKEND_NAME} --format='value(id)')\n echo - \"Waiting for backend id PROJECT=${PROJECT} NAMESPACE=${NAMESPACE} SERVICE=${SERVICE} - filter=name~${BACKEND_NAME}\"\n sleep 2\n done\n echo BACKEND_ID=${BACKEND_ID}\n\n - \ JWT_AUDIENCE=\"/projects/${PROJECT_NUM}/global/backendServices/${BACKEND_ID}\"\n - \ \n # Use kubectl patch.\n echo patch JWT audience: ${JWT_AUDIENCE}\n kubectl - -n ${NAMESPACE} patch policy ingress-jwt --type json -p '[{\"op\": \"replace\", - \"path\": \"/spec/origins/0/jwt/audiences/0\", \"value\": \"'${JWT_AUDIENCE}'\"}]'\n\n - \ echo \"Clearing lock on service annotation\"\n kubectl patch svc \"${SERVICE}\" - -p \"{\\\"metadata\\\": { \\\"annotations\\\": {\\\"backendlock\\\": \\\"\\\" - }}}\"\n}\n\nwhile true; do\n set_jwt_policy\n # Every 5 minutes recheck the - JWT policy and reset it if the backend has changed for some reason.\n # This - follows Kubernetes level based design.\n # We have at least one report see \n - \ # https://github.com/kubeflow/kubeflow/issues/4342#issuecomment-544653657\n - \ # of the backend id changing over time.\n sleep 300\ndone\n" - update_backend.sh: "#!/bin/bash\n#\n# A simple shell script to configure the health - checks by using gcloud.\nset -x\n\n[ -z ${NAMESPACE} ] && echo Error NAMESPACE - must be set && exit 1\n[ -z ${SERVICE} ] && echo Error SERVICE must be set && - exit 1\n[ -z ${INGRESS_NAME} ] && echo Error INGRESS_NAME must be set && exit - 1\n\nPROJECT=$(curl -s -H \"Metadata-Flavor: Google\" http://metadata.google.internal/computeMetadata/v1/project/project-id)\nif - [ -z ${PROJECT} ]; then\n echo Error unable to fetch PROJECT from compute metadata\n - \ exit 1\nfi\n\nif [[ ! -z \"${GOOGLE_APPLICATION_CREDENTIALS}\" ]]; then\n # - TODO(jlewi): As of 0.7 we should always be using workload identity. We can remove - it post 0.7.0 once we have workload identity\n # fully working\n # Activate - the service account, allow 5 retries\n for i in {1..5}; do gcloud auth activate-service-account - --key-file=${GOOGLE_APPLICATION_CREDENTIALS} && break || sleep 10; done\nfi \n\nset_health_check - () {\n NODE_PORT=$(kubectl --namespace=${NAMESPACE} get svc ${SERVICE} -o jsonpath='{.spec.ports[?(@.name==\"http2\")].nodePort}')\n - \ echo node port is ${NODE_PORT}\n\n while [[ -z ${BACKEND_NAME} ]]; do\n BACKENDS=$(kubectl - --namespace=${NAMESPACE} get ingress ${INGRESS_NAME} -o jsonpath='{.metadata.annotations.ingress\\.kubernetes\\.io/backends}')\n - \ echo \"fetching backends info with ${INGRESS_NAME}: ${BACKENDS}\"\n BACKEND_NAME=$(echo - $BACKENDS | grep -o \"k8s-be-${NODE_PORT}--[0-9a-z]\\+\")\n echo \"backend - name is ${BACKEND_NAME}\"\n sleep 2\n done\n\n while [[ -z ${BACKEND_SERVICE} - ]];\n do BACKEND_SERVICE=$(gcloud --project=${PROJECT} compute backend-services - list --filter=name~${BACKEND_NAME} --uri);\n echo \"Waiting for the backend-services - resource PROJECT=${PROJECT} BACKEND_NAME=${BACKEND_NAME} SERVICE=${SERVICE}...\";\n - \ sleep 2;\n done\n\n while [[ -z ${HEALTH_CHECK_URI} ]];\n do HEALTH_CHECK_URI=$(gcloud - compute --project=${PROJECT} health-checks list --filter=name~${BACKEND_NAME} - --uri);\n echo \"Waiting for the healthcheck resource PROJECT=${PROJECT} NODEPORT=${NODE_PORT} - SERVICE=${SERVICE}...\";\n sleep 2;\n done\n\n echo health check URI is ${HEALTH_CHECK_URI}\n\n - \ # Since we create the envoy-ingress ingress object before creating the envoy\n - \ # deployment object, healthcheck will not be configured correctly in the GCP\n - \ # load balancer. It will default the healthcheck request path to a value of\n - \ # / instead of the intended /healthz.\n # Manually update the healthcheck request - path to /healthz\n if [[ ${HEALTHCHECK_PATH} ]]; then\n # This is basic auth\n - \ echo Running health checks update ${HEALTH_CHECK_URI} with ${HEALTHCHECK_PATH}\n - \ gcloud --project=${PROJECT} compute health-checks update http ${HEALTH_CHECK_URI} - --request-path=${HEALTHCHECK_PATH}\n else\n # /healthz/ready is the health - check path for istio-ingressgateway\n echo Running health checks update ${HEALTH_CHECK_URI} - with /healthz/ready\n gcloud --project=${PROJECT} compute health-checks update - http ${HEALTH_CHECK_URI} --request-path=/healthz/ready\n # We need the nodeport - for istio-ingressgateway status-port\n STATUS_NODE_PORT=$(kubectl -n istio-system - get service istio-ingressgateway -o jsonpath='{.spec.ports[?(@.name==\"status-port\")].nodePort}')\n - \ gcloud --project=${PROJECT} compute health-checks update http ${HEALTH_CHECK_URI} - --port=${STATUS_NODE_PORT}\n fi \n}\n\nwhile true; do\n set_health_check\n - \ echo \"Backend updated successfully. Waiting 1 hour before updating again.\"\n - \ sleep 3600\ndone\n" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: envoy-config - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_ingress-bootstrap-config.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_ingress-bootstrap-config.yaml deleted file mode 100644 index e3de6d8b76..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_ingress-bootstrap-config.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: v1 -data: - ingress_bootstrap.sh: | - #!/usr/bin/env bash - - set -x - set -e - - # This is a workaround until this is resolved: https://github.com/kubernetes/ingress-gce/pull/388 - # The long-term solution is to use a managed SSL certificate on GKE once the feature is GA. - - # The ingress is initially created without a tls spec. - # Wait until cert-manager generates the certificate using the http-01 challenge on the GCLB ingress. - # After the certificate is obtained, patch the ingress with the tls spec to enable SSL on the GCLB. - - # Wait for certificate. - until kubectl -n ${NAMESPACE} get secret ${TLS_SECRET_NAME} 2>/dev/null; do - echo "Waiting for certificate..." - sleep 2 - done - - kubectl -n ${NAMESPACE} patch ingress ${INGRESS_NAME} --type='json' -p '[{"op": "add", "path": "/spec/tls", "value": [{"secretName": "'${TLS_SECRET_NAME}'", "hosts":["'${TLS_HOST_NAME}'"]}]}]' - - echo "Done" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: ingress-bootstrap-config - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_parameters.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_parameters.yaml deleted file mode 100644 index afb265fa72..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_configmap_parameters.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -data: - adminSaSecretName: admin-gcp-sa - appName: kf-v1-0210 - hostname: kf-v1-0210.endpoints.jlewi-dev.cloud.goog - ingressName: envoy-ingress - ipName: kf-v1-0210-ip - istioNamespace: istio-system - namespace: istio-system - oauthSecretName: kubeflow-oauth - project: jlewi-dev - tlsSecretName: envoy-ingress-tls -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: parameters - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_service_whoami-app.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_service_whoami-app.yaml deleted file mode 100644 index 887167bb4d..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_service_whoami-app.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: whoami - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: whoami-app - namespace: istio-system -spec: - ports: - - port: 80 - targetPort: 8081 - selector: - app: whoami - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml b/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml deleted file mode 100644 index 3c023123a1..0000000000 --- a/tests/tests/legacy_kustomizations/iap-ingress/test_data/expected/~g_v1_serviceaccount_kf-admin.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: iap-ingress - app.kubernetes.io/instance: iap-ingress-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: iap-ingress - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: iap-ingress - name: kf-admin - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/istio-crds/kustomize_test.go deleted file mode 100644 index c9405a1b6a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/istio-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml deleted file mode 100644 index 306a83db93..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_adapters.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: adapter - release: istio - name: adapters.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: adapter - plural: adapters - singular: adapter - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml deleted file mode 100644 index d0385f0e48..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apikeys.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: apikey - release: istio - name: apikeys.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: apikey - plural: apikeys - singular: apikey - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml deleted file mode 100644 index b904f823e8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_attributemanifests.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: attributemanifests.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: attributemanifest - plural: attributemanifests - singular: attributemanifest - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml deleted file mode 100644 index e7f9bb2ca1..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_authorizations.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: authorization - release: istio - name: authorizations.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: authorization - plural: authorizations - singular: authorization - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml deleted file mode 100644 index 5d853a10d2..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_bypasses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: bypass - release: istio - name: bypasses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: bypass - plural: bypasses - singular: bypass - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml deleted file mode 100644 index 188a1093cd..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.certmanager.k8s.io.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: certificates.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .spec.secretName - name: Secret - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].message - name: Status - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Certificate - plural: certificates - shortNames: - - cert - - certs - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml deleted file mode 100644 index 08e76be423..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_challenges.certmanager.k8s.io.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: challenges.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.dnsName - name: Domain - type: string - - JSONPath: .status.reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Challenge - plural: challenges - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml deleted file mode 100644 index f31fc2477e..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_checknothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: checknothing - release: istio - name: checknothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: checknothing - plural: checknothings - singular: checknothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml deleted file mode 100644 index e5b7194645..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_circonuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: circonus - release: istio - name: circonuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: circonus - plural: circonuses - singular: circonus - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml deleted file mode 100644 index 0c2c35ff0c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_cloudwatches.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: cloudwatch - name: cloudwatches.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: cloudwatch - plural: cloudwatches - singular: cloudwatch - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml deleted file mode 100644 index dea35ef84c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterissuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: clusterissuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: ClusterIssuer - plural: clusterissuers - scope: Cluster - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 366c18ebc7..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_clusterrbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - heritage: Tiller - istio: rbac - release: istio - name: clusterrbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ClusterRbacConfig - plural: clusterrbacconfigs - singular: clusterrbacconfig - scope: Cluster - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml deleted file mode 100644 index 9d89ab9c83..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_deniers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: denier - release: istio - name: deniers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: denier - plural: deniers - singular: denier - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml deleted file mode 100644 index 044b9a80e7..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_destinationrules.networking.istio.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: destinationrules.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.host - description: The name of a service from the service registry - name: Host - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: DestinationRule - listKind: DestinationRuleList - plural: destinationrules - shortNames: - - dr - singular: destinationrule - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml deleted file mode 100644 index 3e6d9dc8ef..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_dogstatsds.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: dogstatsd - name: dogstatsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: dogstatsd - plural: dogstatsds - singular: dogstatsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml deleted file mode 100644 index 65099a24de..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_edges.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: edge - release: istio - name: edges.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: edge - plural: edges - singular: edge - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml deleted file mode 100644 index ed0739556e..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_envoyfilters.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: envoyfilters.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: EnvoyFilter - plural: envoyfilters - singular: envoyfilter - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml deleted file mode 100644 index f3111ccc25..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_fluentds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: fluentd - release: istio - name: fluentds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: fluentd - plural: fluentds - singular: fluentd - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml deleted file mode 100644 index f7420c2f40..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_gateways.networking.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: gateways.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Gateway - plural: gateways - shortNames: - - gw - singular: gateway - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml deleted file mode 100644 index dab8c75f1b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_handlers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-handler - package: handler - release: istio - name: handlers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: handler - plural: handlers - singular: handler - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml deleted file mode 100644 index 1771daadae..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpecBinding - plural: httpapispecbindings - singular: httpapispecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml deleted file mode 100644 index cbf2f79146..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_httpapispecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: httpapispecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: HTTPAPISpec - plural: httpapispecs - singular: httpapispec - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml deleted file mode 100644 index 9699fa820f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_instances.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: instance - release: istio - name: instances.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: instance - plural: instances - singular: instance - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml deleted file mode 100644 index a0c186a1d1..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_issuers.certmanager.k8s.io.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: issuers.certmanager.k8s.io -spec: - group: certmanager.k8s.io - names: - kind: Issuer - plural: issuers - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml deleted file mode 100644 index 7b7da141af..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kubernetesenvs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: kubernetesenv - release: istio - name: kubernetesenvs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetesenv - plural: kubernetesenvs - singular: kubernetesenv - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml deleted file mode 100644 index 91693505d6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_kuberneteses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: adapter.template.kubernetes - release: istio - name: kuberneteses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: kubernetes - plural: kuberneteses - singular: kubernetes - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml deleted file mode 100644 index cf59ae38ca..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listcheckers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: listchecker - release: istio - name: listcheckers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listchecker - plural: listcheckers - singular: listchecker - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml deleted file mode 100644 index 04806a76c8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_listentries.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: listentry - release: istio - name: listentries.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: listentry - plural: listentries - singular: listentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml deleted file mode 100644 index d1d561e6da..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_logentries.config.istio.io.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: logentry - release: istio - name: logentries.config.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.severity - description: The importance of the log entry - name: Severity - type: string - - JSONPath: .spec.timestamp - description: The time value for the log entry - name: Timestamp - type: string - - JSONPath: .spec.monitored_resource_type - description: Optional expression to compute the type of the monitored resource - this log entry is being recorded on - name: Res Type - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: logentry - plural: logentries - singular: logentry - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml deleted file mode 100644 index c36d6a5e64..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_memquotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: memquota - release: istio - name: memquotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: memquota - plural: memquotas - singular: memquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml deleted file mode 100644 index 56fcaeb04d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_meshpolicies.authentication.istio.io.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: meshpolicies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: MeshPolicy - listKind: MeshPolicyList - plural: meshpolicies - singular: meshpolicy - scope: Cluster - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml deleted file mode 100644 index 19a4a519c0..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: metric - release: istio - name: metrics.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: metric - plural: metrics - singular: metric - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml deleted file mode 100644 index c8cadbd41e..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_noops.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: noop - release: istio - name: noops.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: noop - plural: noops - singular: noop - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml deleted file mode 100644 index 9368360492..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_opas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: opa - release: istio - name: opas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: opa - plural: opas - singular: opa - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml deleted file mode 100644 index 06d5359def..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_orders.certmanager.k8s.io.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: certmanager - chart: certmanager - heritage: Tiller - release: istio - name: orders.certmanager.k8s.io -spec: - additionalPrinterColumns: - - JSONPath: .status.state - name: State - type: string - - JSONPath: .spec.issuerRef.name - name: Issuer - priority: 1 - type: string - - JSONPath: .status.reason - name: Reason - priority: 1 - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: certmanager.k8s.io - names: - kind: Order - plural: orders - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml deleted file mode 100644 index b9933dfd96..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_policies.authentication.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-citadel - chart: istio - heritage: Tiller - release: istio - name: policies.authentication.istio.io -spec: - group: authentication.istio.io - names: - categories: - - istio-io - - authentication-istio-io - kind: Policy - plural: policies - singular: policy - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml deleted file mode 100644 index 07d9e146fc..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_prometheuses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: prometheus - release: istio - name: prometheuses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: prometheus - plural: prometheuses - singular: prometheus - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml deleted file mode 100644 index df929bfdd9..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotas.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: quota - release: istio - name: quotas.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: quota - plural: quotas - singular: quota - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml deleted file mode 100644 index 7434f2f66d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecbindings.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecbindings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpecBinding - plural: quotaspecbindings - singular: quotaspecbinding - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml deleted file mode 100644 index 53d48ab742..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_quotaspecs.config.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-mixer - chart: istio - heritage: Tiller - release: istio - name: quotaspecs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - apim-istio-io - kind: QuotaSpec - plural: quotaspecs - singular: quotaspec - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml deleted file mode 100644 index 7883b0d7c3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacconfigs.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: rbacconfigs.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: RbacConfig - plural: rbacconfigs - singular: rbacconfig - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml deleted file mode 100644 index a197d882a7..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rbacs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: rbac - release: istio - name: rbacs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rbac - plural: rbacs - singular: rbac - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml deleted file mode 100644 index 15158d0df6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_redisquotas.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: redisquota - release: istio - name: redisquotas.config.istio.io -spec: - group: config.istio.io - names: - kind: redisquota - plural: redisquotas - singular: redisquota - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml deleted file mode 100644 index 899806b3a6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_reportnothings.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: reportnothing - release: istio - name: reportnothings.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: reportnothing - plural: reportnothings - singular: reportnothing - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml deleted file mode 100644 index 40b5a703e5..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_rules.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: core - package: istio.io.mixer - release: istio - name: rules.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: rule - plural: rules - singular: rule - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml deleted file mode 100644 index db8fa18cb8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceentries.networking.istio.io.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: serviceentries.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.hosts - description: The hosts associated with the ServiceEntry - name: Hosts - type: string - - JSONPath: .spec.location - description: Whether the service is external to the mesh or part of the mesh (MESH_EXTERNAL - or MESH_INTERNAL) - name: Location - type: string - - JSONPath: .spec.resolution - description: Service discovery mode for the hosts (NONE, STATIC, or DNS) - name: Resolution - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: ServiceEntry - listKind: ServiceEntryList - plural: serviceentries - shortNames: - - se - singular: serviceentry - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml deleted file mode 100644 index 6228a334b0..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_servicerolebindings.rbac.istio.io.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: servicerolebindings.rbac.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.roleRef.name - description: The name of the ServiceRole object being referenced - name: Reference - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRoleBinding - plural: servicerolebindings - singular: servicerolebinding - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml deleted file mode 100644 index 24d78ee506..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serviceroles.rbac.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: rbac - package: istio.io.mixer - release: istio - name: serviceroles.rbac.istio.io -spec: - group: rbac.istio.io - names: - categories: - - istio-io - - rbac-istio-io - kind: ServiceRole - plural: serviceroles - singular: servicerole - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml deleted file mode 100644 index 059355b082..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sidecars.networking.istio.io.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: sidecars.networking.istio.io -spec: - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: Sidecar - plural: sidecars - singular: sidecar - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml deleted file mode 100644 index dfe2f4c61e..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_signalfxs.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: signalfx - release: istio - name: signalfxs.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: signalfx - plural: signalfxs - singular: signalfx - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml deleted file mode 100644 index 6b758b40d9..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_solarwindses.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: solarwinds - release: istio - name: solarwindses.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: solarwinds - plural: solarwindses - singular: solarwinds - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml deleted file mode 100644 index c3e9b39dcd..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stackdrivers.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stackdriver - release: istio - name: stackdrivers.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stackdriver - plural: stackdrivers - singular: stackdriver - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml deleted file mode 100644 index 7b3da3e069..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_statsds.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: statsd - release: istio - name: statsds.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: statsd - plural: statsds - singular: statsd - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml deleted file mode 100644 index 1918fa9b19..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_stdios.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-adapter - package: stdio - release: istio - name: stdios.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: stdio - plural: stdios - singular: stdio - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml deleted file mode 100644 index 60c365f949..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_templates.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-template - package: template - release: istio - name: templates.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: template - plural: templates - singular: template - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml deleted file mode 100644 index 677ffc60bb..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tracespans.config.istio.io.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - chart: istio - heritage: Tiller - istio: mixer-instance - package: tracespan - release: istio - name: tracespans.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: tracespan - plural: tracespans - singular: tracespan - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml deleted file mode 100644 index fa7f9a0d80..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_virtualservices.networking.istio.io.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: istio-pilot - chart: istio - heritage: Tiller - release: istio - name: virtualservices.networking.istio.io -spec: - additionalPrinterColumns: - - JSONPath: .spec.gateways - description: The names of gateways and sidecars that should apply these routes - name: Gateways - type: string - - JSONPath: .spec.hosts - description: The destination hosts to which traffic is being sent - name: Hosts - type: string - - JSONPath: .metadata.creationTimestamp - description: |- - CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC. - - Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata - name: Age - type: date - group: networking.istio.io - names: - categories: - - istio-io - - networking-istio-io - kind: VirtualService - listKind: VirtualServiceList - plural: virtualservices - shortNames: - - vs - singular: virtualservice - scope: Namespaced - version: v1alpha3 diff --git a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml b/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml deleted file mode 100644 index cfd1f91152..0000000000 --- a/tests/tests/legacy_kustomizations/istio-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_zipkins.config.istio.io.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - helm.sh/resource-policy: keep - labels: - app: mixer - istio: mixer-adapter - package: zipkin - name: zipkins.config.istio.io -spec: - group: config.istio.io - names: - categories: - - istio-io - - policy-istio-io - kind: zipkin - plural: zipkins - singular: zipkin - scope: Namespaced - version: v1alpha2 diff --git a/tests/tests/legacy_kustomizations/istio-install/kustomize_test.go b/tests/tests/legacy_kustomizations/istio-install/kustomize_test.go deleted file mode 100644 index b2a0a15f08..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio_install - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/istio-install", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml deleted file mode 100644 index 45f3d51ee0..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_istio-sidecar-injector.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - release: istio - name: istio-sidecar-injector -webhooks: -- clientConfig: - caBundle: "" - service: - name: istio-sidecar-injector - namespace: istio-system - path: /inject - failurePolicy: Fail - name: sidecar-injector.istio.io - namespaceSelector: - matchLabels: - istio-injection: enabled - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_grafana.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_grafana.yaml deleted file mode 100644 index b4fba3181f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_grafana.yaml +++ /dev/null @@ -1,152 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: GRAFANA_PORT - value: "3000" - - name: GF_AUTH_BASIC_ENABLED - value: "false" - - name: GF_AUTH_ANONYMOUS_ENABLED - value: "true" - - name: GF_AUTH_ANONYMOUS_ORG_ROLE - value: Admin - - name: GF_PATHS_DATA - value: /data/grafana - image: grafana/grafana:6.0.2 - imagePullPolicy: IfNotPresent - name: grafana - ports: - - containerPort: 3000 - readinessProbe: - httpGet: - path: /login - port: 3000 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /data/grafana - name: data - - mountPath: /var/lib/grafana/dashboards/istio/galley-dashboard.json - name: dashboards-istio-galley-dashboard - readOnly: true - subPath: galley-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-mesh-dashboard.json - name: dashboards-istio-istio-mesh-dashboard - readOnly: true - subPath: istio-mesh-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-performance-dashboard.json - name: dashboards-istio-istio-performance-dashboard - readOnly: true - subPath: istio-performance-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-service-dashboard.json - name: dashboards-istio-istio-service-dashboard - readOnly: true - subPath: istio-service-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/istio-workload-dashboard.json - name: dashboards-istio-istio-workload-dashboard - readOnly: true - subPath: istio-workload-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/mixer-dashboard.json - name: dashboards-istio-mixer-dashboard - readOnly: true - subPath: mixer-dashboard.json - - mountPath: /var/lib/grafana/dashboards/istio/pilot-dashboard.json - name: dashboards-istio-pilot-dashboard - readOnly: true - subPath: pilot-dashboard.json - - mountPath: /etc/grafana/provisioning/datasources/datasources.yaml - name: config - subPath: datasources.yaml - - mountPath: /etc/grafana/provisioning/dashboards/dashboardproviders.yaml - name: config - subPath: dashboardproviders.yaml - securityContext: - fsGroup: 472 - runAsUser: 472 - volumes: - - configMap: - name: istio-grafana - name: config - - emptyDir: {} - name: data - - configMap: - name: istio-grafana-configuration-dashboards-galley-dashboard - name: dashboards-istio-galley-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - name: dashboards-istio-istio-mesh-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - name: dashboards-istio-istio-performance-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-service-dashboard - name: dashboards-istio-istio-service-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - name: dashboards-istio-istio-workload-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-mixer-dashboard - name: dashboards-istio-mixer-dashboard - - configMap: - name: istio-grafana-configuration-dashboards-pilot-dashboard - name: dashboards-istio-pilot-dashboard diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-citadel.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-citadel.yaml deleted file mode 100644 index 8cf48324fd..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-citadel.yaml +++ /dev/null @@ -1,90 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --append-dns-names=true - - --grpc-port=8060 - - --grpc-hostname=citadel - - --citadel-storage-namespace=istio-system - - --custom-dns-names=istio-pilot-service-account.istio-system:istio-pilot.istio-system - - --monitoring-port=15014 - - --self-signed-ca=true - image: docker.io/istio/citadel:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: citadel - resources: - requests: - cpu: 10m - serviceAccountName: istio-citadel-service-account diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml deleted file mode 100644 index 82a3fce5a3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-egressgateway.yaml +++ /dev/null @@ -1,171 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-egressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 80 - - containerPort: 443 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-certs - name: egressgateway-certs - readOnly: true - - mountPath: /etc/istio/egressgateway-ca-certs - name: egressgateway-ca-certs - readOnly: true - serviceAccountName: istio-egressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-egressgateway-service-account - - name: egressgateway-certs - secret: - optional: true - secretName: istio-egressgateway-certs - - name: egressgateway-ca-certs - secret: - optional: true - secretName: istio-egressgateway-ca-certs diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-galley.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-galley.yaml deleted file mode 100644 index 9bdf1a9c23..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-galley.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /usr/local/bin/galley - - server - - --meshConfigFile=/etc/mesh-config/mesh - - --livenessProbeInterval=1s - - --livenessProbePath=/healthliveness - - --readinessProbePath=/healthready - - --readinessProbeInterval=1s - - --deployment-namespace=istio-system - - --insecure=true - - --validation-webhook-config-file - - /etc/config/validatingwebhookconfiguration.yaml - - --monitoringPort=15014 - - --log_output_level=default:info - - --enable-validation=true - image: docker.io/istio/galley:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthliveness - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - name: galley - ports: - - containerPort: 443 - - containerPort: 15014 - - containerPort: 9901 - readinessProbe: - exec: - command: - - /usr/local/bin/galley - - probe - - --probe-path=/healthready - - --interval=10s - initialDelaySeconds: 5 - periodSeconds: 5 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/certs - name: certs - readOnly: true - - mountPath: /etc/config - name: config - readOnly: true - - mountPath: /etc/mesh-config - name: mesh-config - readOnly: true - serviceAccountName: istio-galley-service-account - volumes: - - name: certs - secret: - secretName: istio.istio-galley-service-account - - configMap: - name: istio-galley-configuration - name: config - - configMap: - name: istio - name: mesh-config diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml deleted file mode 100644 index 01d4547b36..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-ingressgateway.yaml +++ /dev/null @@ -1,177 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - selector: - matchLabels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - proxy - - router - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --log_output_level=default:info - - --drainDuration - - 45s - - --parentShutdownDuration - - 1m0s - - --connectTimeout - - 10s - - --serviceCluster - - istio-ingressgateway - - --zipkinAddress - - zipkin:9411 - - --proxyAdminPort - - "15000" - - --statusPort - - "15020" - - --controlPlaneAuthPolicy - - NONE - - --discoveryAddress - - istio-pilot:15010 - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - - name: HOST_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.hostIP - - name: ISTIO_META_POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: ISTIO_META_CONFIG_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: ISTIO_META_ROUTER_MODE - value: sni-dnat - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15020 - - containerPort: 80 - - containerPort: 443 - - containerPort: 31400 - - containerPort: 15029 - - containerPort: 15030 - - containerPort: 15031 - - containerPort: 15032 - - containerPort: 15443 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - readinessProbe: - failureThreshold: 30 - httpGet: - path: /healthz/ready - port: 15020 - scheme: HTTP - initialDelaySeconds: 1 - periodSeconds: 2 - successThreshold: 1 - timeoutSeconds: 1 - resources: - limits: - cpu: 100m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-certs - name: ingressgateway-certs - readOnly: true - - mountPath: /etc/istio/ingressgateway-ca-certs - name: ingressgateway-ca-certs - readOnly: true - serviceAccountName: istio-ingressgateway-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-ingressgateway-service-account - - name: ingressgateway-certs - secret: - optional: true - secretName: istio-ingressgateway-certs - - name: ingressgateway-ca-certs - secret: - optional: true - secretName: istio-ingressgateway-ca-certs diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-pilot.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-pilot.yaml deleted file mode 100644 index 3eaa8c4269..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-pilot.yaml +++ /dev/null @@ -1,175 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - annotations: - checksum/config-volume: f8da08b6b8c170dde721efd680270b2901e750d4aa186ebb6c22bef5b78a43f9 - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - selector: - matchLabels: - istio: pilot - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - discovery - - --monitoringAddr=:15014 - - --log_output_level=default:info - - --domain - - cluster.local - - --secureGrpcAddr - - "" - - --keepaliveMaxServerConnectionAge - - 30m - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: GODEBUG - value: gctrace=1 - - name: PILOT_PUSH_THROTTLE - value: "100" - - name: PILOT_TRACE_SAMPLING - value: "100" - - name: PILOT_DISABLE_XDS_MARSHALING_TO_ANY - value: "1" - image: docker.io/istio/pilot:1.1.6 - imagePullPolicy: IfNotPresent - name: discovery - ports: - - containerPort: 8080 - - containerPort: 15010 - readinessProbe: - httpGet: - path: /ready - port: 8080 - initialDelaySeconds: 5 - periodSeconds: 30 - timeoutSeconds: 5 - resources: - limits: - cpu: 100m - memory: 200Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-pilot - - --templateFile - - /etc/istio/proxy/envoy_pilot.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 15003 - - containerPort: 15005 - - containerPort: 15007 - - containerPort: 15011 - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - serviceAccountName: istio-pilot-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: istio-certs - secret: - optional: true - secretName: istio.istio-pilot-service-account diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-policy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-policy.yaml deleted file mode 100644 index 204884f48a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-policy.yaml +++ /dev/null @@ -1,168 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: policy - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 10m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-policy - - --templateFile - - /etc/istio/proxy/envoy_policy.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - - mountPath: /var/run/secrets/istio.io/policy/adapter - name: policy-adapter-secret - readOnly: true - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: policy-adapter-secret - secret: - optional: true - secretName: policy-adapter-secret diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml deleted file mode 100644 index a7d7af79d5..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-sidecar-injector.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --caCertFile=/etc/istio/certs/root-cert.pem - - --tlsCertFile=/etc/istio/certs/cert-chain.pem - - --tlsKeyFile=/etc/istio/certs/key.pem - - --injectConfig=/etc/istio/inject/config - - --meshConfig=/etc/istio/config/mesh - - --healthCheckInterval=2s - - --healthCheckFile=/health - image: docker.io/istio/sidecar_injector:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - name: sidecar-injector-webhook - readinessProbe: - exec: - command: - - /usr/local/bin/sidecar-injector - - probe - - --probe-path=/health - - --interval=4s - initialDelaySeconds: 4 - periodSeconds: 4 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/istio/config - name: config-volume - readOnly: true - - mountPath: /etc/istio/certs - name: certs - readOnly: true - - mountPath: /etc/istio/inject - name: inject-config - readOnly: true - serviceAccountName: istio-sidecar-injector-service-account - volumes: - - configMap: - name: istio - name: config-volume - - name: certs - secret: - secretName: istio.istio-sidecar-injector-service-account - - configMap: - items: - - key: config - path: config - name: istio-sidecar-injector - name: inject-config diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-telemetry.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-telemetry.yaml deleted file mode 100644 index e848f4ba90..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-telemetry.yaml +++ /dev/null @@ -1,172 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: istio-mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - selector: - matchLabels: - istio: mixer - istio-mixer-type: telemetry - strategy: - rollingUpdate: - maxSurge: 1 - maxUnavailable: 0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --monitoringPort=15014 - - --address - - unix:///sock/mixer.socket - - --log_output_level=default:info - - --configStoreURL=mcp://istio-galley.istio-system.svc:9901 - - --configDefaultNamespace=istio-system - - --useAdapterCRDs=true - - --trace_zipkin_url=http://zipkin:9411/api/v1/spans - - --averageLatencyThreshold - - 100ms - - --loadsheddingMode - - enforce - env: - - name: GODEBUG - value: gctrace=1 - - name: GOMAXPROCS - value: "6" - image: docker.io/istio/mixer:1.1.6 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /version - port: 15014 - initialDelaySeconds: 5 - periodSeconds: 5 - name: mixer - ports: - - containerPort: 15014 - - containerPort: 42422 - resources: - limits: - cpu: 100m - memory: 100Mi - requests: - cpu: 50m - memory: 100Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /var/run/secrets/istio.io/telemetry/adapter - name: telemetry-adapter-secret - readOnly: true - - mountPath: /sock - name: uds-socket - - args: - - proxy - - --domain - - $(POD_NAMESPACE).svc.cluster.local - - --serviceCluster - - istio-telemetry - - --templateFile - - /etc/istio/proxy/envoy_telemetry.yaml.tmpl - - --controlPlaneAuthPolicy - - NONE - env: - - name: POD_NAME - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.name - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: INSTANCE_IP - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: status.podIP - image: docker.io/istio/proxyv2:1.1.6 - imagePullPolicy: IfNotPresent - name: istio-proxy - ports: - - containerPort: 9091 - - containerPort: 15004 - - containerPort: 15090 - name: http-envoy-prom - protocol: TCP - resources: - limits: - cpu: 2000m - memory: 128Mi - requests: - cpu: 10m - memory: 40Mi - volumeMounts: - - mountPath: /etc/certs - name: istio-certs - readOnly: true - - mountPath: /sock - name: uds-socket - serviceAccountName: istio-mixer-service-account - volumes: - - name: istio-certs - secret: - optional: true - secretName: istio.istio-mixer-service-account - - emptyDir: {} - name: uds-socket - - name: telemetry-adapter-secret - secret: - optional: true - secretName: telemetry-adapter-secret diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-tracing.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-tracing.yaml deleted file mode 100644 index a67c51e985..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_istio-tracing.yaml +++ /dev/null @@ -1,99 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: istio-tracing - namespace: istio-system -spec: - selector: - matchLabels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - template: - metadata: - annotations: - prometheus.io/path: /jaeger/metrics - prometheus.io/port: "16686" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - apiVersion: v1 - fieldPath: metadata.namespace - - name: COLLECTOR_ZIPKIN_HTTP_PORT - value: "9411" - - name: MEMORY_MAX_TRACES - value: "50000" - - name: QUERY_BASE_PATH - value: /jaeger - image: docker.io/jaegertracing/all-in-one:1.9 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: / - port: 16686 - name: jaeger - ports: - - containerPort: 9411 - - containerPort: 16686 - - containerPort: 5775 - protocol: UDP - - containerPort: 6831 - protocol: UDP - - containerPort: 6832 - protocol: UDP - readinessProbe: - httpGet: - path: / - port: 16686 - resources: - requests: - cpu: 10m diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_kiali.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_kiali.yaml deleted file mode 100644 index 6bbccb9b25..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_kiali.yaml +++ /dev/null @@ -1,97 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: kiali - template: - metadata: - annotations: - prometheus.io/port: "9090" - prometheus.io/scrape: "true" - scheduler.alpha.kubernetes.io/critical-pod: "" - sidecar.istio.io/inject: "false" - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /opt/kiali/kiali - - -config - - /kiali-configuration/config.yaml - - -v - - "4" - env: - - name: ACTIVE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: PROMETHEUS_SERVICE_URL - value: http://prometheus:9090 - - name: SERVER_WEB_ROOT - value: /kiali - image: docker.io/kiali/kiali:v0.16 - name: kiali - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /kiali-configuration - name: kiali-configuration - - mountPath: /kiali-secret - name: kiali-secret - serviceAccountName: kiali-service-account - volumes: - - configMap: - name: kiali - name: kiali-configuration - - name: kiali-secret - secret: - optional: true - secretName: kiali diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_prometheus.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_prometheus.yaml deleted file mode 100644 index 613cd2fe17..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/apps_v1_deployment_prometheus.yaml +++ /dev/null @@ -1,93 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - replicas: 1 - selector: - matchLabels: - app: prometheus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - args: - - --storage.tsdb.retention=6h - - --config.file=/etc/prometheus/prometheus.yml - image: docker.io/prom/prometheus:v2.3.1 - imagePullPolicy: IfNotPresent - livenessProbe: - httpGet: - path: /-/healthy - port: 9090 - name: prometheus - ports: - - containerPort: 9090 - name: http - readinessProbe: - httpGet: - path: /-/ready - port: 9090 - resources: - requests: - cpu: 10m - volumeMounts: - - mountPath: /etc/prometheus - name: config-volume - - mountPath: /etc/istio-certs - name: istio-certs - serviceAccountName: prometheus - volumes: - - configMap: - name: prometheus - name: config-volume - - name: istio-certs - secret: - defaultMode: 420 - secretName: istio.default diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml deleted file mode 100644 index cdbeef32e3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-egressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-egressgateway diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml deleted file mode 100644 index c5a6bdd2d8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-ingressgateway.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-ingressgateway diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml deleted file mode 100644 index 1c3bd0a78a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-pilot.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-pilot diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml deleted file mode 100644 index f33a22eeca..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-policy.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-policy diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml deleted file mode 100644 index 8fc6b67d67..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_istio-telemetry.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - maxReplicas: 5 - metrics: - - resource: - name: cpu - targetAverageUtilization: 80 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: istio-telemetry diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml deleted file mode 100644 index e3cf64d5b2..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-cleanup-secrets-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "3" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - -c - - | - kubectl get secret --all-namespaces | grep "istio.io/key-and-cert" | while read -r entry; do - ns=$(echo $entry | awk '{print $1}'); - name=$(echo $entry | awk '{print $2}'); - kubectl delete secret $name -n $ns; - done - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - restartPolicy: OnFailure - serviceAccountName: istio-cleanup-secrets-service-account diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml deleted file mode 100644 index 79d95f8258..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-grafana-post-install-1.1.6.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: istio-grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/grafana/run.sh - - /tmp/grafana/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - name: kubectl - volumeMounts: - - mountPath: /tmp/grafana - name: tmp-configmap-grafana - restartPolicy: OnFailure - serviceAccountName: istio-grafana-post-install-account - volumes: - - configMap: - name: istio-grafana-custom-resources - name: tmp-configmap-grafana diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml deleted file mode 100644 index f907dee1af..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/batch_v1_job_istio-security-post-install-1.1.6.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: batch/v1 -kind: Job -metadata: - annotations: - helm.sh/hook: post-install - helm.sh/hook-delete-policy: hook-succeeded - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-1.1.6 - namespace: istio-system -spec: - template: - metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install - spec: - affinity: - nodeAffinity: - preferredDuringSchedulingIgnoredDuringExecution: - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - ppc64le - weight: 2 - - preference: - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - s390x - weight: 2 - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: beta.kubernetes.io/arch - operator: In - values: - - amd64 - - ppc64le - - s390x - containers: - - command: - - /bin/bash - - /tmp/security/run.sh - - /tmp/security/custom-resources.yaml - image: docker.io/istio/kubectl:1.1.6 - imagePullPolicy: IfNotPresent - name: kubectl - volumeMounts: - - mountPath: /tmp/security - name: tmp-configmap-security - restartPolicy: OnFailure - serviceAccountName: istio-security-post-install-account - volumes: - - configMap: - name: istio-security-custom-resources - name: tmp-configmap-security diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml deleted file mode 100644 index d475e6bc55..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_istioproxy.yaml +++ /dev/null @@ -1,138 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istioproxy - namespace: istio-system -spec: - attributes: - api.operation: - valueType: STRING - api.protocol: - valueType: STRING - api.service: - valueType: STRING - api.version: - valueType: STRING - check.cache_hit: - valueType: BOOL - check.error_code: - valueType: INT64 - check.error_message: - valueType: STRING - connection.duration: - valueType: DURATION - connection.event: - valueType: STRING - connection.id: - valueType: STRING - connection.mtls: - valueType: BOOL - connection.received.bytes: - valueType: INT64 - connection.received.bytes_total: - valueType: INT64 - connection.requested_server_name: - valueType: STRING - connection.sent.bytes: - valueType: INT64 - connection.sent.bytes_total: - valueType: INT64 - context.protocol: - valueType: STRING - context.proxy_error_code: - valueType: STRING - context.reporter.kind: - valueType: STRING - context.reporter.local: - valueType: BOOL - context.reporter.uid: - valueType: STRING - context.time: - valueType: TIMESTAMP - context.timestamp: - valueType: TIMESTAMP - destination.port: - valueType: INT64 - destination.principal: - valueType: STRING - destination.uid: - valueType: STRING - origin.ip: - valueType: IP_ADDRESS - origin.uid: - valueType: STRING - origin.user: - valueType: STRING - quota.cache_hit: - valueType: BOOL - rbac.permissive.effective_policy_id: - valueType: STRING - rbac.permissive.response_code: - valueType: STRING - request.api_key: - valueType: STRING - request.auth.audiences: - valueType: STRING - request.auth.claims: - valueType: STRING_MAP - request.auth.presenter: - valueType: STRING - request.auth.principal: - valueType: STRING - request.auth.raw_claims: - valueType: STRING - request.headers: - valueType: STRING_MAP - request.host: - valueType: STRING - request.id: - valueType: STRING - request.method: - valueType: STRING - request.path: - valueType: STRING - request.query_params: - valueType: STRING_MAP - request.reason: - valueType: STRING - request.referer: - valueType: STRING - request.scheme: - valueType: STRING - request.size: - valueType: INT64 - request.time: - valueType: TIMESTAMP - request.total_size: - valueType: INT64 - request.url_path: - valueType: STRING - request.useragent: - valueType: STRING - response.code: - valueType: INT64 - response.duration: - valueType: DURATION - response.grpc_message: - valueType: STRING - response.grpc_status: - valueType: STRING - response.headers: - valueType: STRING_MAP - response.size: - valueType: INT64 - response.time: - valueType: TIMESTAMP - response.total_size: - valueType: INT64 - source.principal: - valueType: STRING - source.uid: - valueType: STRING - source.user: - valueType: STRING diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml deleted file mode 100644 index 6b39cc0347..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_attributemanifest_kubernetes.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: attributemanifest -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetes - namespace: istio-system -spec: - attributes: - destination.container.name: - valueType: STRING - destination.ip: - valueType: IP_ADDRESS - destination.labels: - valueType: STRING_MAP - destination.metadata: - valueType: STRING_MAP - destination.name: - valueType: STRING - destination.namespace: - valueType: STRING - destination.owner: - valueType: STRING - destination.service.host: - valueType: STRING - destination.service.name: - valueType: STRING - destination.service.namespace: - valueType: STRING - destination.service.uid: - valueType: STRING - destination.serviceAccount: - valueType: STRING - destination.workload.name: - valueType: STRING - destination.workload.namespace: - valueType: STRING - destination.workload.uid: - valueType: STRING - source.ip: - valueType: IP_ADDRESS - source.labels: - valueType: STRING_MAP - source.metadata: - valueType: STRING_MAP - source.name: - valueType: STRING - source.namespace: - valueType: STRING - source.owner: - valueType: STRING - source.serviceAccount: - valueType: STRING - source.services: - valueType: STRING - source.workload.name: - valueType: STRING - source.workload.namespace: - valueType: STRING - source.workload.uid: - valueType: STRING diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml deleted file mode 100644 index 41928afff6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_kubernetesenv.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubernetesenv - namespace: istio-system -spec: - compiledAdapter: kubernetesenv - params: null diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml deleted file mode 100644 index 7558b99229..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_prometheus.yaml +++ /dev/null @@ -1,216 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - compiledAdapter: prometheus - params: - metrics: - - instance_name: requestcount.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: requests_total - - buckets: - explicit_buckets: - bounds: - - 0.005 - - 0.01 - - 0.025 - - 0.05 - - 0.1 - - 0.25 - - 0.5 - - 1 - - 2.5 - - 5 - - 10 - instance_name: requestduration.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_duration_seconds - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: requestsize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: request_bytes - - buckets: - exponentialBuckets: - growthFactor: 10 - numFiniteBuckets: 8 - scale: 1 - instance_name: responsesize.metric.istio-system - kind: DISTRIBUTION - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - request_protocol - - response_code - - response_flags - - permissive_response_code - - permissive_response_policyid - - connection_security_policy - name: response_bytes - - instance_name: tcpbytesent.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_sent_bytes_total - - instance_name: tcpbytereceived.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_received_bytes_total - - instance_name: tcpconnectionsopened.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_opened_total - - instance_name: tcpconnectionsclosed.metric.istio-system - kind: COUNTER - label_names: - - reporter - - source_app - - source_principal - - source_workload - - source_workload_namespace - - source_version - - destination_app - - destination_principal - - destination_workload - - destination_workload_namespace - - destination_version - - destination_service - - destination_service_name - - destination_service_namespace - - connection_security_policy - - response_flags - name: tcp_connections_closed_total - metricsExpirationPolicy: - metricsExpiryDuration: 10m diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml deleted file mode 100644 index 2baf4e9096..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_handler_stdio.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: handler -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - compiledAdapter: stdio - params: - outputAsJson: true diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml deleted file mode 100644 index 1e66576783..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_kubernetes_attributes.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: kubernetes -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: attributes - namespace: istio-system -spec: - attribute_bindings: - destination.container.name: $out.destination_container_name | "unknown" - destination.ip: $out.destination_pod_ip | ip("0.0.0.0") - destination.labels: $out.destination_labels | emptyStringMap() - destination.name: $out.destination_pod_name | "unknown" - destination.namespace: $out.destination_namespace | "default" - destination.owner: $out.destination_owner | "unknown" - destination.serviceAccount: $out.destination_service_account_name | "unknown" - destination.uid: $out.destination_pod_uid | "unknown" - destination.workload.name: $out.destination_workload_name | "unknown" - destination.workload.namespace: $out.destination_workload_namespace | "unknown" - destination.workload.uid: $out.destination_workload_uid | "unknown" - source.ip: $out.source_pod_ip | ip("0.0.0.0") - source.labels: $out.source_labels | emptyStringMap() - source.name: $out.source_pod_name | "unknown" - source.namespace: $out.source_namespace | "default" - source.owner: $out.source_owner | "unknown" - source.serviceAccount: $out.source_service_account_name | "unknown" - source.uid: $out.source_pod_uid | "unknown" - source.workload.name: $out.source_workload_name | "unknown" - source.workload.namespace: $out.source_workload_namespace | "unknown" - source.workload.uid: $out.source_workload_uid | "unknown" - destination_port: destination.port | 0 - destination_uid: destination.uid | "" - source_ip: source.ip | ip("0.0.0.0") - source_uid: source.uid | "" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml deleted file mode 100644 index c4098d4e17..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_accesslog.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: accesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: request.time - variables: - apiClaims: request.auth.raw_claims | "" - apiKey: request.api_key | request.headers["x-api-key"] | "" - clientTraceId: request.headers["x-client-trace-id"] | "" - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - grpcMessage: response.grpc_message | "" - grpcStatus: response.grpc_status | "" - httpAuthority: request.headers[":authority"] | request.host | "" - latency: response.duration | "0ms" - method: request.method | "" - permissiveResponseCode: rbac.permissive.response_code | "none" - permissiveResponsePolicyID: rbac.permissive.effective_policy_id | "none" - protocol: request.scheme | context.protocol | "http" - receivedBytes: request.total_size | 0 - referer: request.referer | "" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestId: request.headers["x-request-id"] | "" - requestSize: request.size | 0 - requestedServerName: connection.requested_server_name | "" - responseCode: response.code | 0 - responseFlags: context.proxy_error_code | "" - responseSize: response.size | 0 - responseTimestamp: response.time - sentBytes: response.total_size | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - url: request.path | "" - userAgent: request.useragent | "" - xForwardedFor: request.headers["x-forwarded-for"] | "0.0.0.0" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml deleted file mode 100644 index 797b01697d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_logentry_tcpaccesslog.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: logentry -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpaccesslog - namespace: istio-system -spec: - monitored_resource_type: '"global"' - severity: '"Info"' - timestamp: context.time | timestamp("2017-01-01T00:00:00Z") - variables: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - connectionDuration: connection.duration | "0ms" - connectionEvent: connection.event | "" - destinationApp: destination.labels["app"] | "" - destinationIp: destination.ip | ip("0.0.0.0") - destinationName: destination.name | "" - destinationNamespace: destination.namespace | "" - destinationOwner: destination.owner | "" - destinationPrincipal: destination.principal | "" - destinationServiceHost: destination.service.host | "" - destinationWorkload: destination.workload.name | "" - protocol: context.protocol | "tcp" - receivedBytes: connection.received.bytes | 0 - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - requestedServerName: connection.requested_server_name | "" - responseFlags: context.proxy_error_code | "" - sentBytes: connection.sent.bytes | 0 - sourceApp: source.labels["app"] | "" - sourceIp: source.ip | ip("0.0.0.0") - sourceName: source.name | "" - sourceNamespace: source.namespace | "" - sourceOwner: source.owner | "" - sourcePrincipal: source.principal | "" - sourceWorkload: source.workload.name | "" - totalReceivedBytes: connection.received.bytes_total | 0 - totalSentBytes: connection.sent.bytes_total | 0 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml deleted file mode 100644 index 5aa199b236..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestcount.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestcount - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml deleted file mode 100644 index 914e4d4b5a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestduration.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestduration - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.duration | "0ms" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml deleted file mode 100644 index 155343600d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_requestsize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: requestsize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: request.size | 0 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml deleted file mode 100644 index d3aafb93c3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_responsesize.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: responsesize - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - permissive_response_code: rbac.permissive.response_code | "none" - permissive_response_policyid: rbac.permissive.effective_policy_id | "none" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - request_protocol: api.protocol | context.protocol | "unknown" - response_code: response.code | 200 - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: response.size | 0 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml deleted file mode 100644 index 33e8f468b9..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytereceived.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytereceived - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.received.bytes | 0 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml deleted file mode 100644 index 39df34138c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpbytesent.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpbytesent - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.host | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: connection.sent.bytes | 0 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml deleted file mode 100644 index f2b80ce1d8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsclosed.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsclosed - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml deleted file mode 100644 index 68dbbf0c9c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_metric_tcpconnectionsopened.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: metric -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpconnectionsopened - namespace: istio-system -spec: - dimensions: - connection_security_policy: conditional((context.reporter.kind | "inbound") == - "outbound", "unknown", conditional(connection.mtls | false, "mutual_tls", "none")) - destination_app: destination.labels["app"] | "unknown" - destination_principal: destination.principal | "unknown" - destination_service: destination.service.name | "unknown" - destination_service_name: destination.service.name | "unknown" - destination_service_namespace: destination.service.namespace | "unknown" - destination_version: destination.labels["version"] | "unknown" - destination_workload: destination.workload.name | "unknown" - destination_workload_namespace: destination.workload.namespace | "unknown" - reporter: conditional((context.reporter.kind | "inbound") == "outbound", "source", - "destination") - response_flags: context.proxy_error_code | "-" - source_app: source.labels["app"] | "unknown" - source_principal: source.principal | "unknown" - source_version: source.labels["version"] | "unknown" - source_workload: source.workload.name | "unknown" - source_workload_namespace: source.workload.namespace | "unknown" - monitored_resource_type: '"UNSPECIFIED"' - value: "1" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml deleted file mode 100644 index 16f89c981d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_kubeattrgenrulerule.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: kubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml deleted file mode 100644 index 6ba4b19caa..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promhttp.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promhttp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - requestcount.metric - - requestduration.metric - - requestsize.metric - - responsesize.metric - match: (context.protocol == "http" || context.protocol == "grpc") && (match((request.useragent - | "-"), "kube-probe*") == false) diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml deleted file mode 100644 index 74466f18be..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcp.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcp - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpbytesent.metric - - tcpbytereceived.metric - match: context.protocol == "tcp" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml deleted file mode 100644 index 4414aa902c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionclosed.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionclosed - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsclosed.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "close") diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml deleted file mode 100644 index 5d119b596e..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_promtcpconnectionopen.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: promtcpconnectionopen - namespace: istio-system -spec: - actions: - - handler: prometheus - instances: - - tcpconnectionsopened.metric - match: context.protocol == "tcp" && ((connection.event | "na") == "open") diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml deleted file mode 100644 index 2d272125d1..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdio.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdio - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - accesslog.logentry - match: context.protocol == "http" || context.protocol == "grpc" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml deleted file mode 100644 index 339c38a2bd..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_stdiotcp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: stdiotcp - namespace: istio-system -spec: - actions: - - handler: stdio - instances: - - tcpaccesslog.logentry - match: context.protocol == "tcp" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml deleted file mode 100644 index 7e713777c2..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/config.istio.io_v1alpha2_rule_tcpkubeattrgenrulerule.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: config.istio.io/v1alpha2 -kind: rule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: tcpkubeattrgenrulerule - namespace: istio-system -spec: - actions: - - handler: kubernetesenv - instances: - - attributes.kubernetes - match: context.protocol == "tcp" diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml deleted file mode 100644 index 4bc62dd7f8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-policy.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-policy - namespace: istio-system -spec: - host: istio-policy.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml deleted file mode 100644 index 97db246c89..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/networking.istio.io_v1alpha3_destinationrule_istio-telemetry.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: DestinationRule -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-telemetry - namespace: istio-system -spec: - host: istio-telemetry.istio-system.svc.cluster.local - trafficPolicy: - connectionPool: - http: - http2MaxRequests: 10000 - maxRequestsPerConnection: 10000 diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml deleted file mode 100644 index a1c5f6ab12..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-egressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-egressgateway - istio: egressgateway - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml deleted file mode 100644 index 9a384b903b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-galley.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: galley - istio: galley - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml deleted file mode 100644 index 579d4ec2e0..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-ingressgateway.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: istio-ingressgateway - istio: ingressgateway - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml deleted file mode 100644 index 73bd8933ad..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-pilot.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: pilot - istio: pilot - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml deleted file mode 100644 index 5ac4f6464a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-policy.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: policy - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: policy - release: istio - version: 1.1.0 - name: istio-policy - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: policy - istio: mixer - istio-mixer-type: policy - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml deleted file mode 100644 index ee5c3a1dee..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/policy_v1beta1_poddisruptionbudget_istio-telemetry.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: policy/v1beta1 -kind: PodDisruptionBudget -metadata: - labels: - app: telemetry - chart: mixer - heritage: Tiller - istio: mixer - istio-mixer-type: telemetry - release: istio - version: 1.1.0 - name: istio-telemetry - namespace: istio-system -spec: - minAvailable: 1 - selector: - matchLabels: - app: telemetry - istio: mixer - istio-mixer-type: telemetry - release: istio diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml deleted file mode 100644 index cb57ab8639..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - update -- apiGroups: - - "" - resources: - - secrets - verbs: - - create - - get - - watch - - list - - update - - delete -- apiGroups: - - "" - resources: - - serviceaccounts - - services - verbs: - - get - - watch - - list -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index b31002df62..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - list - - delete diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 14745dd1b5..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml deleted file mode 100644 index 31cd021e86..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-galley-istio-system.yaml +++ /dev/null @@ -1,85 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-istio-system -rules: -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments - verbs: - - get -- apiGroups: - - "" - resources: - - pods - - nodes - - services - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resourceNames: - - istio-galley - resources: - - deployments/finalizers - verbs: - - update diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml deleted file mode 100644 index f38f3710ac..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-grafana-post-install-istio-system.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index ce57730853..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - destinationrules - - gateways - verbs: - - get - - watch - - list - - update diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml deleted file mode 100644 index 4c406989f2..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-mixer-istio-system.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - create - - get - - list - - watch - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - pods - - services - - namespaces - - secrets - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml deleted file mode 100644 index fbf58bcdd1..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -rules: -- apiGroups: - - config.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - rbac.istio.io - resources: - - '*' - verbs: - - get - - watch - - list -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - - ingresses/status - verbs: - - '*' -- apiGroups: - - "" - resources: - - configmaps - verbs: - - create - - get - - list - - watch - - update -- apiGroups: - - "" - resources: - - endpoints - - pods - - services - - namespaces - - nodes - - secrets - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml deleted file mode 100644 index 40b0dd6c47..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-reader.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: istio-reader -rules: -- apiGroups: - - "" - resources: - - nodes - - pods - - services - - endpoints - - replicationcontrollers - verbs: - - get - - watch - - list -- apiGroups: - - extensions - - apps - resources: - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml deleted file mode 100644 index 06d72de038..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_istio-sidecar-injector-istio-system.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-istio-system -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - get - - list - - watch - - patch diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml deleted file mode 100644 index a00bd03674..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali-viewer.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-viewer -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - servicecontrolreports - - servicecontrols - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - get - - list - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - get - - list - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - get - - list - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - get - - list - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml deleted file mode 100644 index de91e8f85c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kiali.yaml +++ /dev/null @@ -1,134 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - namespaces - - nodes - - pods - - services - - replicationcontrollers - verbs: - - get - - list - - watch -- apiGroups: - - extensions - - apps - resources: - - deployments - - statefulsets - - replicasets - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - get - - list - - watch -- apiGroups: - - config.istio.io - resources: - - apikeys - - authorizations - - checknothings - - circonuses - - deniers - - fluentds - - handlers - - kubernetesenvs - - kuberneteses - - listcheckers - - listentries - - logentries - - memquotas - - metrics - - opas - - prometheuses - - quotas - - quotaspecbindings - - quotaspecs - - rbacs - - reportnothings - - rules - - solarwindses - - stackdrivers - - statsds - - stdios - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules - - gateways - - serviceentries - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - authentication.istio.io - resources: - - policies - - meshpolicies - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - rbac.istio.io - resources: - - clusterrbacconfigs - - rbacconfigs - - serviceroles - - servicerolebindings - verbs: - - create - - delete - - get - - list - - patch - - watch -- apiGroups: - - monitoring.kiali.io - resources: - - monitoringdashboards - verbs: - - get diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml deleted file mode 100644 index 4e42dfb6a6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_prometheus-istio-system.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -rules: -- apiGroups: - - "" - resources: - - nodes - - services - - endpoints - - pods - - nodes/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get -- nonResourceURLs: - - /metrics - verbs: - - get diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml deleted file mode 100644 index 28ac035ab6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-citadel-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-citadel-istio-system -subjects: -- kind: ServiceAccount - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml deleted file mode 100644 index fcc37b18d8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-cleanup-secrets-istio-system.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "2" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-cleanup-secrets-istio-system -subjects: -- kind: ServiceAccount - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml deleted file mode 100644 index 291dd013b8..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-egressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-egressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml deleted file mode 100644 index 9c2ca1a82c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-galley-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-galley-istio-system -subjects: -- kind: ServiceAccount - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 473c34c42b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-grafana-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-grafana-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml deleted file mode 100644 index c4b2804104..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-ingressgateway-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-ingressgateway-istio-system -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml deleted file mode 100644 index d1db23758b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-kiali-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: istio-kiali-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kiali -subjects: -- kind: ServiceAccount - name: kiali-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml deleted file mode 100644 index 8c801ce56f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-mixer-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-mixer-istio-system -subjects: -- kind: ServiceAccount - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml deleted file mode 100644 index b7cccaacb3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-multi.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - chart: istio-1.1.0 - name: istio-multi -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-reader -subjects: -- kind: ServiceAccount - name: istio-multi - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml deleted file mode 100644 index fc78ced111..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-pilot-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-pilot-istio-system -subjects: -- kind: ServiceAccount - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml deleted file mode 100644 index fc5d7a83d6..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_istio-sidecar-injector-admin-role-binding-istio-system.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-admin-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-sidecar-injector-istio-system -subjects: -- kind: ServiceAccount - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml deleted file mode 100644 index 455f52e864..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_prometheus-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: prometheus-istio-system -subjects: -- kind: ServiceAccount - name: prometheus - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml deleted file mode 100644 index 9078948664..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_role_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - watch - - list diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml deleted file mode 100644 index 2b7f198468..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_istio-ingressgateway-sds.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: istio-ingressgateway-sds - namespace: istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: istio-ingressgateway-sds -subjects: -- kind: ServiceAccount - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml deleted file mode 100644 index 57718cea6d..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_istio-security-post-install-istio-system.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-istio-system -rules: -- apiGroups: - - authentication.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - '*' - verbs: - - '*' -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - verbs: - - get -- apiGroups: - - extensions - - apps - resources: - - deployments - - replicasets - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml deleted file mode 100644 index 725830af27..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_istio-security-post-install-role-binding-istio-system.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-role-binding-istio-system -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: istio-security-post-install-istio-system -subjects: -- kind: ServiceAccount - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml deleted file mode 100644 index cc77485872..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-galley-configuration.yaml +++ /dev/null @@ -1,123 +0,0 @@ -apiVersion: v1 -data: - validatingwebhookconfiguration.yaml: |- - apiVersion: admissionregistration.k8s.io/v1beta1 - kind: ValidatingWebhookConfiguration - metadata: - name: istio-galley - namespace: istio-system - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - istio: galley - webhooks: - - name: pilot.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitpilot" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - httpapispecs - - httpapispecbindings - - quotaspecs - - quotaspecbindings - - operations: - - CREATE - - UPDATE - apiGroups: - - rbac.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - authentication.istio.io - apiVersions: - - "*" - resources: - - "*" - - operations: - - CREATE - - UPDATE - apiGroups: - - networking.istio.io - apiVersions: - - "*" - resources: - - destinationrules - - envoyfilters - - gateways - - serviceentries - - sidecars - - virtualservices - failurePolicy: Fail - - name: mixer.validation.istio.io - clientConfig: - service: - name: istio-galley - namespace: istio-system - path: "/admitmixer" - caBundle: "" - rules: - - operations: - - CREATE - - UPDATE - apiGroups: - - config.istio.io - apiVersions: - - v1alpha2 - resources: - - rules - - attributemanifests - - circonuses - - deniers - - fluentds - - kubernetesenvs - - listcheckers - - memquotas - - noops - - opas - - prometheuses - - rbacs - - solarwindses - - stackdrivers - - cloudwatches - - dogstatsds - - statsds - - stdios - - apikeys - - authorizations - - checknothings - # - kuberneteses - - listentries - - logentries - - metrics - - quotas - - reportnothings - - tracespans - failurePolicy: Fail -kind: ConfigMap -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley-configuration - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml deleted file mode 100644 index c7b460e359..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-galley-dashboard.yaml +++ /dev/null @@ -1,341 +0,0 @@ -apiVersion: v1 -data: - galley-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- - Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", - "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "links": [], "panels": [ { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 0 }, "id": 46, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"galley\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Galley Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 5 }, "id": 40, "panels": [], "title": "Resource Usage", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 0, "y": - 6 }, "id": 36, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "process_virtual_memory_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Virtual Memory", - "refId": "A" }, { "expr": "process_resident_memory_bytes{job=\"galley\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", "refId": - "B" }, { "expr": "go_memstats_heap_sys_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "heap sys", "refId": "C" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "heap alloc", "refId": - "D" }, { "expr": "go_memstats_alloc_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F" }, { "expr": "go_memstats_heap_inuse_bytes{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": - "G" }, { "expr": "go_memstats_stack_inuse_bytes{job=\"galley\"}", "format": "time_series", - "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "H" }, { "expr": - "sum(container_memory_usage_bytes{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Total (kis)", "refId": - "E" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 6, "y": 6 }, "id": 38, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", pod_name=~\"istio-galley-.*\"}[1m]))", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": - "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}[1m])) by (container_name)", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B" - }, { "expr": "irate(process_cpu_seconds_total{job=\"galley\"}[1m])", "format": - "time_series", "intervalFactor": 2, "legendFormat": "galley (self-reported)", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 6, "x": 12, "y": 6 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"galley\"}", "format": "time_series", "intervalFactor": - 2, "legendFormat": "Open FDs (galley)", "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"galley\", - pod_name=~\"istio-galley-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }} ", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeRegions": [], "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 6, "x": 18, "y": 6 }, "id": - 44, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"galley\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "goroutines_total", - "refId": "A" }, { "expr": "galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "clients_total", "refId": "B" }, { "expr": - "go_goroutines{job=\"galley\"}/galley_mcp_source_clients_total", "format": "time_series", - "intervalFactor": 1, "legendFormat": "avg_goroutines_per_client", "refId": "C" - } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 14 }, "id": 10, "panels": [], "title": "Runtime", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 15 }, "id": - 2, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(galley_runtime_strategy_on_change_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Strategy - Change Events", "refId": "A" }, { "expr": "sum(rate(galley_runtime_processor_events_processed_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Processed - Events", "refId": "B" }, { "expr": "sum(rate(galley_runtime_processor_snapshots_published_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Snapshot - Published", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Event Rates", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": "Events/min", "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": "", "logBase": 1, "max": null, "min": null, - "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 15 }, "id": 4, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(galley_runtime_strategy_timer_max_time_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Max Time - Reached", "refId": "A" }, { "expr": "sum(rate(galley_runtime_strategy_timer_quiesce_reached_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Quiesce - Reached", "refId": "B" }, { "expr": "sum(rate(galley_runtime_strategy_timer_resets_total[1m])) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Timer Resets", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Timer Rates", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 15 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 3, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": true, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.50, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P50", "refId": - "A" }, { "expr": "histogram_quantile(0.90, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P90", "refId": - "B" }, { "expr": "histogram_quantile(0.95, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P95", "refId": - "C" }, { "expr": "histogram_quantile(0.99, sum by (le) (galley_runtime_processor_snapshot_events_total_bucket))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "P99", "refId": - "D" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Events Per Snapshot", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by (typeURL) (galley_runtime_state_type_instances_total)", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ typeURL }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "State Type - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Count", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "collapsed": false, "gridPos": { "h": 1, "w": - 24, "x": 0, "y": 27 }, "id": 34, "panels": [], "title": "Validation", "type": - "row" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": - 28 }, "id": 28, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "galley_validation_cert_key_updates{job=\"galley\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Key Updates", "refId": - "A" }, { "expr": "galley_validation_cert_key_update_errors{job=\"galley\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Key Update Errors: {{ error - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], - "timeShift": null, "title": "Validation Webhook Certificate", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 8, "y": 28 }, "id": 30, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_passed{job=\"galley\"}) by (group, - version, resource)", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Passed: {{ group }}/{{ version }}/{{resource}}", "refId": "A" }, { "expr": "sum(galley_validation_failed{job=\"galley\"}) - by (group, version, resource, reason)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Failed: {{ group }}/{{ version }}/{{resource}} ({{ reason}})", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Resource Validation", "tooltip": { "shared": true, "sort": 0, - "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": - "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true } - ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": - false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": - 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": 28 }, "id": 32, "legend": { "avg": - false, "current": false, "max": false, "min": false, "show": true, "total": false, - "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(galley_validation_http_error{job=\"galley\"}) by (status)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ status }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Validation HTTP Errors", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 34 }, "id": 12, "panels": [], "title": - "Kubernetes Source", "type": "row" }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 0, "y": 35 }, "id": 14, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_event_success_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Success", "refId": "A" }, { "expr": "rate(galley_source_kube_event_error_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Source Event Rate", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "Events/min", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 35 }, "id": 16, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_source_kube_dynamic_converter_success_total[1m]) * 60", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{apiVersion=\"{{apiVersion}}\",group=\"{{group}}\",kind=\"{{kind}}\"}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Successes", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Conversions/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 16, "y": - 35 }, "id": 24, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "rate(galley_source_kube_dynamic_converter_failure_total[1m]) - * 60", "format": "time_series", "intervalFactor": 1, "legendFormat": "Error", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": - null, "title": "Kubernetes Object Conversion Failures", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "Failures/min", "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "collapsed": false, "gridPos": { "h": 1, "w": 24, "x": 0, "y": 41 - }, "id": 18, "panels": [], "title": "Mesh Configuration Protocol", "type": "row" - }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 8, "x": 0, "y": 42 }, "id": - 20, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(galley_mcp_source_clients_total)", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Clients", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": [], "timeShift": null, - "title": "Connected Clients", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 42 }, "id": 22, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum by(collection)(irate(galley_mcp_source_request_acks_total[1m]) * 60)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeRegions": [], "timeShift": null, "title": "Request - ACKs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": "ACKs/min", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 42 }, "id": 26, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "rate(galley_mcp_source_request_nacks_total[1m]) * 60", "format": "time_series", - "intervalFactor": 1, "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeRegions": - [], "timeShift": null, "title": "Request NACKs", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": "NACKs/min", "logBase": 1, "max": null, "min": null, - "show": true }, { "format": "short", "label": null, "logBase": 1, "max": null, - "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } - } ], "refresh": "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": - { "list": [] }, "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Galley Dashboard", "uid": "TSEY6jLmk", "version": 1 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-galley-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml deleted file mode 100644 index 8be80d7176..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-mesh-dashboard.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: v1 -data: - istio-mesh-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "singlestat", "name": - "Singlestat", "version": "5.0.0" }, { "type": "panel", "id": "table", "name": - "Table", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "content": - "
\n
\n Istio\n
\n
\n Istio - is an open platform - that provides a uniform way to connect,\n manage, and \n secure microservices.\n
\n Need help? Join the - Istio community.\n
\n
", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "50px", "id": 13, "links": - [], "mode": "html", "style": { "font-size": "18pt" }, "title": "", "transparent": - true, "type": "text" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": - false, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "datasource": "Prometheus", "format": "ops", "gauge": { "maxValue": - 100, "minValue": 0, "show": false, "thresholdLabels": false, "thresholdMarkers": - true }, "gridPos": { "h": 3, "w": 6, "x": 0, "y": 3 }, "id": 20, "interval": null, - "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", "value": - 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": - "connected", "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": - "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": - "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, - "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": "", "targets": - [ { "expr": "round(sum(irate(istio_requests_total{reporter=\"destination\"}[1m])), - 0.001)", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": "", "title": - "Global Request Volume", "transparent": false, "type": "singlestat", "valueFontSize": - "80%", "valueMaps": [ { "op": "=", "text": "N/A", "value": "null" } ], "valueName": - "avg" }, { "cacheTimeout": null, "colorBackground": false, "colorValue": false, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "datasource": "Prometheus", "format": "percentunit", "gauge": { - "maxValue": 100, "minValue": 80, "show": false, "thresholdLabels": false, "thresholdMarkers": - false }, "gridPos": { "h": 3, "w": 6, "x": 6, "y": 3 }, "id": 21, "interval": - null, "links": [], "mappingType": 1, "mappingTypes": [ { "name": "value to text", - "value": 1 }, { "name": "range to text", "value": 2 } ], "maxDataPoints": 100, - "nullPointMode": "connected", "nullText": null, "postfix": "", "postfixFontSize": - "50%", "prefix": "", "prefixFontSize": "50%", "rangeMaps": [ { "from": "null", - "text": "N/A", "to": "null" } ], "sparkline": { "fillColor": "rgba(31, 118, 189, - 0.18)", "full": true, "lineColor": "rgb(31, 120, 193)", "show": true }, "tableColumn": - "", "targets": [ { "expr": "sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) / sum(rate(istio_requests_total{reporter=\"destination\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "refId": "A", "step": 4 } ], "thresholds": - "95, 99, 99.5", "title": "Global Success Rate (non-5xx responses)", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 12, "y": 3 }, "id": 22, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"4.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "4xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "cacheTimeout": null, - "colorBackground": false, "colorValue": false, "colors": [ "rgba(245, 54, 54, - 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "datasource": - "Prometheus", "format": "ops", "gauge": { "maxValue": 100, "minValue": 0, "show": - false, "thresholdLabels": false, "thresholdMarkers": true }, "gridPos": { "h": - 3, "w": 6, "x": 18, "y": 3 }, "id": 23, "interval": null, "links": [], "mappingType": - 1, "mappingTypes": [ { "name": "value to text", "value": 1 }, { "name": "range - to text", "value": 2 } ], "maxDataPoints": 100, "nullPointMode": "connected", - "nullText": null, "postfix": "", "postfixFontSize": "50%", "prefix": "", "prefixFontSize": - "50%", "rangeMaps": [ { "from": "null", "text": "N/A", "to": "null" } ], "sparkline": - { "fillColor": "rgba(31, 118, 189, 0.18)", "full": true, "lineColor": "rgb(31, - 120, 193)", "show": true }, "tableColumn": "", "targets": [ { "expr": "sum(irate(istio_requests_total{reporter=\"destination\", - response_code=~\"5.*\"}[1m])) ", "format": "time_series", "intervalFactor": 1, - "refId": "A", "step": 4 } ], "thresholds": "", "title": "5xxs", "transparent": - false, "type": "singlestat", "valueFontSize": "80%", "valueMaps": [ { "op": "=", - "text": "N/A", "value": "null" } ], "valueName": "avg" }, { "columns": [], "datasource": - "Prometheus", "fontSize": "100%", "gridPos": { "h": 21, "w": 24, "x": 0, "y": - 6 }, "hideTimeOverride": false, "id": 73, "links": [], "pageSize": null, "repeat": - null, "repeatDirection": "v", "scroll": true, "showHeader": true, "sort": { "col": - 4, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": false, "linkTargetBlank": - false, "linkTooltip": "Workload dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_2&var-workload=$__cell_", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": - "Time", "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Requests", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [], "type": "number", "unit": "ops" }, - { "alias": "P50 Latency", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "Value #B", "thresholds": [], "type": "number", - "unit": "s" }, { "alias": "P90 Latency", "colorMode": null, "colors": [ "rgba(245, - 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #D", "thresholds": [], - "type": "number", "unit": "s" }, { "alias": "P99 Latency", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value - #E", "thresholds": [], "type": "number", "unit": "s" }, { "alias": "Success Rate", - "colorMode": "cell", "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, - 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #F", "thresholds": [ ".95", " 1.00" ], "type": "number", - "unit": "percentunit" }, { "alias": "Workload", "colorMode": null, "colors": [ - "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": - "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-workload=$__cell_2&var-namespace=$__cell_3", - "pattern": "destination_workload_var", "thresholds": [], "type": "number", "unit": - "short" }, { "alias": "Service", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, "linkTooltip": "$__cell dashboard", - "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", "pattern": - "destination_service", "thresholds": [], "type": "string", "unit": "short" }, - { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, - 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", - "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": [], - "type": "hidden", "unit": "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_requests_total{reporter=\"destination\", - response_code=\"200\"}[1m])) by (destination_workload, destination_workload_namespace, - destination_service), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "intervalFactor": 1, "legendFormat": "{{ destination_workload}}.{{ destination_workload_namespace - }}", "refId": "A" }, { "expr": "label_join(histogram_quantile(0.50, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload}}.{{ destination_workload_namespace }}", "refId": "B" - }, { "expr": "label_join(histogram_quantile(0.90, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "D" - }, { "expr": "label_join(histogram_quantile(0.99, sum(rate(istio_request_duration_seconds_bucket{reporter=\"destination\"}[1m])) - by (le, destination_workload, destination_workload_namespace)), \"destination_workload_var\", - \".\", \"destination_workload\", \"destination_workload_namespace\")", "format": - "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}.{{ destination_workload_namespace }}", "refId": "E" - }, { "expr": "label_join((sum(rate(istio_requests_total{reporter=\"destination\", - response_code!~\"5.*\"}[1m])) by (destination_workload, destination_workload_namespace) - / sum(rate(istio_requests_total{reporter=\"destination\"}[1m])) by (destination_workload, - destination_workload_namespace)), \"destination_workload_var\", \".\", \"destination_workload\", - \"destination_workload_namespace\")", "format": "table", "hide": false, "instant": - true, "interval": "", "intervalFactor": 1, "legendFormat": "{{ destination_workload - }}.{{ destination_workload_namespace }}", "refId": "F" } ], "timeFrom": null, - "title": "HTTP/GRPC Workloads", "transform": "table", "transparent": false, "type": - "table" }, { "columns": [], "datasource": "Prometheus", "fontSize": "100%", "gridPos": - { "h": 18, "w": 24, "x": 0, "y": 27 }, "hideTimeOverride": false, "id": 109, "links": - [], "pageSize": null, "repeatDirection": "v", "scroll": true, "showHeader": true, - "sort": { "col": 2, "desc": true }, "styles": [ { "alias": "Workload", "colorMode": - null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, - 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": - false, "linkTargetBlank": false, "linkTooltip": "$__cell dashboard", "linkUrl": - "/dashboard/db/istio-tcp-workload-dashboard?var-namespace=$__cell_2&&var-workload=$__cell", - "pattern": "destination_workload", "preserveFormat": false, "sanitize": false, - "thresholds": [], "type": "hidden", "unit": "short" }, { "alias": "Bytes Sent", - "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", - "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": - 2, "pattern": "Value #A", "thresholds": [ "" ], "type": "number", "unit": "Bps" - }, { "alias": "Bytes Received", "colorMode": null, "colors": [ "rgba(245, 54, - 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": - "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Value #C", "thresholds": [], - "type": "number", "unit": "Bps" }, { "alias": "", "colorMode": null, "colors": - [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" - ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "pattern": "Time", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Workload", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-workload-dashboard?var-namespace=$__cell_3&var-workload=$__cell_2", - "pattern": "destination_workload_var", "thresholds": [], "type": "string", "unit": - "short" }, { "alias": "", "colorMode": null, "colors": [ "rgba(245, 54, 54, 0.9)", - "rgba(237, 129, 40, 0.89)", "rgba(50, 172, 45, 0.97)" ], "dateFormat": "YYYY-MM-DD - HH:mm:ss", "decimals": 2, "pattern": "destination_workload_namespace", "thresholds": - [], "type": "hidden", "unit": "short" }, { "alias": "Service", "colorMode": null, - "colors": [ "rgba(245, 54, 54, 0.9)", "rgba(237, 129, 40, 0.89)", "rgba(50, 172, - 45, 0.97)" ], "dateFormat": "YYYY-MM-DD HH:mm:ss", "decimals": 2, "link": true, - "linkTooltip": "$__cell dashboard", "linkUrl": "/dashboard/db/istio-service-dashboard?var-service=$__cell", - "pattern": "destination_service", "thresholds": [], "type": "number", "unit": - "short" } ], "targets": [ { "expr": "label_join(sum(rate(istio_tcp_received_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "C" }, { "expr": "label_join(sum(rate(istio_tcp_sent_bytes_total{reporter=\"source\"}[1m])) - by (destination_workload, destination_workload_namespace, destination_service), - \"destination_workload_var\", \".\", \"destination_workload\", \"destination_workload_namespace\")", - "format": "table", "hide": false, "instant": true, "intervalFactor": 1, "legendFormat": - "{{ destination_workload }}", "refId": "A" } ], "timeFrom": null, "title": "TCP - Workloads", "transform": "table", "transparent": false, "type": "table" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 24, "x": 0, "y": 45 }, "id": 111, "legend": - { "alignAsTable": false, "avg": false, "current": false, "max": false, "min": - false, "rightSide": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(istio_build) by (component, tag)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ component }}: {{ tag }}", "refId": "A" } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Istio Components by Version", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "transparent": - false, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Mesh - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-mesh-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml deleted file mode 100644 index 0d56502d7a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-performance-dashboard.yaml +++ /dev/null @@ -1,150 +0,0 @@ -apiVersion: v1 -data: - istio-performance-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": - "Prometheus", "description": "", "type": "datasource", "pluginId": "prometheus", - "pluginName": "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", - "name": "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": - "Graph", "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": - "Prometheus", "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", - "version": "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": - "-- Grafana --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, - 1)", "name": "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, - "gnetId": null, "graphTooltip": 0, "id": null, "links": [], "panels": [ { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 9, "w": 12, "x": 0, "y": 0 }, "id": 2, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m])) - / (round(sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m])), 0.001)/1000)", "format": "time_series", "intervalFactor": - 1, "legendFormat": "istio-ingressgateway", "refId": "B" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", - "refId": "C" }, { "expr": "(sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))/ - (round(sum(irate(istio_requests_total[1m])), 0.001)/1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU / 1k rps", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 12, "y": 0 }, "id": 6, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-telemetry-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-ingressgateway-.*\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-ingressgateway", - "refId": "B" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{namespace!=\"istio-system\",container_name=\"istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-proxy", "refId": - "C" }, { "expr": "sum(rate(container_cpu_usage_seconds_total{pod_name=~\"istio-policy-.*\",container_name=~\"mixer|istio-proxy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "vCPU", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 12, "x": 0, "y": 9 }, "id": 4, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "(sum(container_memory_usage_bytes{pod_name=~\"istio-telemetry-.*\"}) / (sum(irate(istio_requests_total[1m])) - / 1000)) / (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry - / 1k rps", "refId": "A" }, { "expr": "sum(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\"}) - / count(container_memory_usage_bytes{pod_name=~\"istio-ingressgateway-.*\",container_name!=\"POD\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-ingressgateway", - "refId": "C" }, { "expr": "sum(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"}) - / count(container_memory_usage_bytes{namespace!=\"istio-system\",container_name=\"istio-proxy\"})", - "format": "time_series", "intervalFactor": 1, "legendFormat": "per istio-proxy", - "refId": "B" }, { "expr": "(sum(container_memory_usage_bytes{pod_name=~\"istio-policy-.*\"}) - / (sum(irate(istio_requests_total[1m])) / 1000))/ (sum(irate(istio_requests_total{source_workload=\"istio-ingressgateway\"}[1m])) - >bool 10)", "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy - / 1k rps", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Memory", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "decbytes", "label": - null, "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", - "label": null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 9, "w": 12, "x": 12, "y": 9 }, "id": 5, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-telemetry\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-telemetry\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-telemetry", - "refId": "A" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload=\"istio-ingressgateway\", - reporter=\"source\"}[1m]))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "istio-ingressgateway", "refId": "C" }, { "expr": "sum(irate(istio_response_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_response_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m])) + sum(irate(istio_request_bytes_sum{source_workload_namespace!=\"istio-system\", - reporter=\"source\"}[1m])) + sum(irate(istio_request_bytes_sum{destination_workload_namespace!=\"istio-system\", - reporter=\"destination\"}[1m]))", "format": "time_series", "intervalFactor": 1, - "legendFormat": "istio-proxy", "refId": "D" }, { "expr": "sum(irate(istio_response_bytes_sum{destination_workload=\"istio-policy\"}[1m])) - + sum(irate(istio_request_bytes_sum{destination_workload=\"istio-policy\"}[1m]))", - "format": "time_series", "intervalFactor": 1, "legendFormat": "istio-policy", - "refId": "E" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Bytes transferred / sec", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 9, "w": 24, "x": 0, "y": 18 }, "id": 8, "legend": { "alignAsTable": false, "avg": - false, "current": false, "max": false, "min": false, "rightSide": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build) by (component, - tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ component - }}: {{ tag }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Istio Components by Version", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "transparent": false, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "The charts on this dashboard are intended to show Istio - main components cost in terms resources utilization under steady load.\n\n- **vCPU/1k - rps:** shows vCPU utilization by the main Istio components normalized by 1000 - requests/second. When idle or low traffic, this chart will be blank. The curve - for istio-proxy refers to the services sidecars only. \n- **vCPU:** vCPU utilization - by Istio components, not normalized.\n- **Memory:** memory footprint for the components. - Telemetry and policy are normalized by 1k rps, and no data is shown when there - is no traffic. For ingress and istio-proxy, the data is per instance. \n- **Bytes - transferred/ sec:** shows the number of bytes flowing through each Istio component.", - "gridPos": { "h": 4, "w": 24, "x": 0, "y": 18 }, "id": 11, "links": [], "mode": - "markdown", "title": "Istio Performance Dashboard Readme", "type": "text" } ], - "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": [] }, - "time": { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": - [ "5s", "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": - [ "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Performance Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-performance-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml deleted file mode 100644 index d39f3a822a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-service-dashboard.yaml +++ /dev/null @@ -1,795 +0,0 @@ -apiVersion: v1 -data: - istio-service-dashboard.json: "{ \"annotations\": { \"list\": [ { \"builtIn\": 1, - \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": true, \"iconColor\": - \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", \"type\": \"dashboard\" - } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": 0, \"iteration\": - 1536442501501, \"links\": [], \"panels\": [ { \"content\": \"
\\nSERVICE: $service\\n
\", \"gridPos\": { \"h\": - 3, \"w\": 24, \"x\": 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", - \"title\": \"\", \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": - null, \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"rgba(245, - 54, 54, 0.9)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": - \"Prometheus\", \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Client Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 3 }, \"id\": 14, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Client Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Client Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 3 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m]))\", \"format\": \"time_series\", \"hide\": - false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" } ], \"thresholds\": - \"\", \"title\": \"TCP Received Bytes\", \"transparent\": false, \"type\": \"singlestat\", - \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", - \"value\": \"null\" } ], \"valueName\": \"avg\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 6, \"x\": 0, \"y\": 7 }, \"id\": 97, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Server Request Volume\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"current\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, 129, 40, 0.89)\", \"rgba(245, - 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", \"decimals\": null, \"format\": - \"percentunit\", \"gauge\": { \"maxValue\": 100, \"minValue\": 80, \"show\": false, - \"thresholdLabels\": false, \"thresholdMarkers\": false }, \"gridPos\": { \"h\": - 4, \"w\": 6, \"x\": 6, \"y\": 7 }, \"id\": 98, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Server Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 6, - \"x\": 12, \"y\": 7 }, \"id\": 99, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"interval\": \"\", \"intervalFactor\": - 1, \"legendFormat\": \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P90\", \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_service=~\\\"$service\\\"}[1m])) - by (le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"P99\", \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": - null, \"timeShift\": null, \"title\": \"Server Request Duration\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, - 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": \"Bps\", \"gauge\": - { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": false, - \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 6, \"x\": 18, \"y\": - 7 }, \"id\": 100, \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": - [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", - \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": - null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - destination_service=~\\\"$service\\\"}[1m])) \", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Sent Bytes\", \"transparent\": false, - \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ { \"op\": - \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" }, { - \"content\": \"
\\nCLIENT - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"source\\\",source_workload=~\\\"$srcwl\\\",source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"source\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace }} : - {{ response_code }}\", \"refId\": \"A\", \"step\": 2 } ], \"thresholds\": [], - \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Requests by Source - And Response Code\", \"tooltip\": { \"shared\": false, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": - [ { \"format\": \"ops\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(irate(istio_requests_total{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": { \"align\": - false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"description\": \"\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 20 }, \"id\": - 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, \"rightSide\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 20 }, \"id\": - 68, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": - 80, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": - \"{{ source_workload }}.{{ source_workload_namespace}}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, - \"alignLevel\": null } }, { \"content\": \"
\\nSERVICE - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 32 }, \"id\": 69, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 35 }, \"id\": 90, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\",destination_service=~\\\"$service\\\",reporter=\\\"destination\\\",destination_workload=~\\\"$dstwl\\\",destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace, response_code), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", reporter=\\\"destination\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[5m])) by (destination_workload, - destination_workload_namespace, response_code), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} : {{ response_code }}\", \"refId\": \"A\", - \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Incoming Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ], \"yaxis\": { \"align\": false, \"alignLevel\": null - } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 12, \"y\": 35 }, \"id\": 91, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", - \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\",response_code!~\\\"5.*\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace) / sum(rate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[5m])) - by (destination_workload, destination_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], - \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming - Success Rate (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ], \"yaxis\": { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 41 }, \"id\": 94, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 95, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 96, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50 (\U0001F510mTLS)\", - \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Source\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } }, { \"aliasColors\": {}, \"bars\": - false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 92, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_workload }}.{{ destination_workload_namespace}} (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_service=~\\\"$service\\\", - destination_workload=~\\\"$dstwl\\\", destination_workload_namespace=~\\\"$dstns\\\"}[1m])) - by (destination_workload, destination_workload_namespace), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_workload - }}.{{ destination_workload_namespace}}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Bytes Received from - Incoming TCP Connection\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"Bps\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": - true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, - \"min\": null, \"show\": true } ], \"yaxis\": { \"align\": false, \"alignLevel\": - null } }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 12, \"x\": 12, \"y\": 47 }, \"id\": 93, \"legend\": { \"avg\": false, \"current\": - false, \"max\": false, \"min\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", destination_service=~\\\"$service\\\", destination_workload=~\\\"$dstwl\\\", - destination_workload_namespace=~\\\"$dstns\\\"}[1m])) by (destination_workload, - destination_workload_namespace), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_workload }}.{{destination_workload_namespace - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ], \"yaxis\": - { \"align\": false, \"alignLevel\": null } } ], \"refresh\": \"10s\", \"schemaVersion\": - 16, \"style\": \"dark\", \"tags\": [], \"templating\": { \"list\": [ { \"allValue\": - null, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": false, \"label\": - \"Service\", \"multi\": false, \"name\": \"service\", \"options\": [], \"query\": - \"label_values(destination_service)\", \"refresh\": 1, \"regex\": \"\", \"sort\": - 0, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", - \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": \"All\", - \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": - true, \"label\": \"Client Workload Namespace\", \"multi\": true, \"name\": \"srcns\", - \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (source_workload_namespace) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\"}) by (source_workload_namespace))\", \"refresh\": - 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": { \"text\": \"All\", \"value\": \"$__all\" - }, \"datasource\": \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": - \"Client Workload\", \"multi\": true, \"name\": \"srcwl\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", source_workload_namespace=~\\\"$srcns\\\"}) - by (source_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload Namespace\", \"multi\": true, - \"name\": \"dstns\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=\\\"$service\\\"}) by (destination_workload_namespace) or - sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_service=~\\\"$service\\\"}) - by (destination_workload_namespace))\", \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", - \"sort\": 2, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": { \"text\": - \"All\", \"value\": \"$__all\" }, \"datasource\": \"Prometheus\", \"hide\": 0, - \"includeAll\": true, \"label\": \"Service Workload\", \"multi\": true, \"name\": - \"dstwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_service=~\\\"$service\\\", destination_workload_namespace=~\\\"$dstns\\\"}) - by (destination_workload))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 3, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Service Dashboard\", \"uid\": \"LJ_uJAvmk\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-service-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml deleted file mode 100644 index a3022b2cab..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-istio-workload-dashboard.yaml +++ /dev/null @@ -1,744 +0,0 @@ -apiVersion: v1 -data: - istio-workload-dashboard.json: "{ \"__inputs\": [ { \"name\": \"DS_PROMETHEUS\", - \"label\": \"Prometheus\", \"description\": \"\", \"type\": \"datasource\", \"pluginId\": - \"prometheus\", \"pluginName\": \"Prometheus\" } ], \"__requires\": [ { \"type\": - \"grafana\", \"id\": \"grafana\", \"name\": \"Grafana\", \"version\": \"5.0.4\" - }, { \"type\": \"panel\", \"id\": \"graph\", \"name\": \"Graph\", \"version\": - \"5.0.0\" }, { \"type\": \"datasource\", \"id\": \"prometheus\", \"name\": \"Prometheus\", - \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"singlestat\", \"name\": - \"Singlestat\", \"version\": \"5.0.0\" }, { \"type\": \"panel\", \"id\": \"text\", - \"name\": \"Text\", \"version\": \"5.0.0\" } ], \"annotations\": { \"list\": [ - { \"builtIn\": 1, \"datasource\": \"-- Grafana --\", \"enable\": true, \"hide\": - true, \"iconColor\": \"rgba(0, 211, 255, 1)\", \"name\": \"Annotations & Alerts\", - \"type\": \"dashboard\" } ] }, \"editable\": false, \"gnetId\": null, \"graphTooltip\": - 0, \"id\": null, \"iteration\": 1531345461465, \"links\": [], \"panels\": [ { - \"content\": \"
\\nWORKLOAD: - $workload.$namespace\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": - 0, \"y\": 0 }, \"id\": 89, \"links\": [], \"mode\": \"html\", \"title\": \"\", - \"transparent\": true, \"type\": \"text\" }, { \"cacheTimeout\": null, \"colorBackground\": - false, \"colorValue\": false, \"colors\": [ \"rgba(245, 54, 54, 0.9)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(50, 172, 45, 0.97)\" ], \"datasource\": \"Prometheus\", - \"format\": \"ops\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": - false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, \"gridPos\": - { \"h\": 4, \"w\": 8, \"x\": 0, \"y\": 3 }, \"id\": 12, \"interval\": null, \"links\": - [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": - 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, - \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": - \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": - \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": - \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", - \"show\": true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m])), - 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"A\", - \"step\": 4 } ], \"thresholds\": \"\", \"title\": \"Incoming Request Volume\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"current\" }, { \"cacheTimeout\": null, \"colorBackground\": false, - \"colorValue\": false, \"colors\": [ \"rgba(50, 172, 45, 0.97)\", \"rgba(237, - 129, 40, 0.89)\", \"rgba(245, 54, 54, 0.9)\" ], \"datasource\": \"Prometheus\", - \"decimals\": null, \"format\": \"percentunit\", \"gauge\": { \"maxValue\": 100, - \"minValue\": 80, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": - false }, \"gridPos\": { \"h\": 4, \"w\": 8, \"x\": 8, \"y\": 3 }, \"id\": 14, - \"interval\": null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": - \"value to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 - } ], \"maxDataPoints\": 100, \"nullPointMode\": \"connected\", \"nullText\": null, - \"postfix\": \"\", \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": - \"50%\", \"rangeMaps\": [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" - } ], \"sparkline\": { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, - \"lineColor\": \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", - \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\"}[5m])) - / sum(irate(istio_requests_total{reporter=\\\"destination\\\",destination_workload_namespace=~\\\"$namespace\\\",destination_workload=~\\\"$workload\\\"}[5m]))\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"refId\": \"B\" } ], \"thresholds\": - \"95, 99, 99.5\", \"title\": \"Incoming Success Rate (non-5xx responses)\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 4, \"w\": 8, - \"x\": 16, \"y\": 3 }, \"id\": 87, \"legend\": { \"alignAsTable\": false, \"avg\": - false, \"current\": false, \"hideEmpty\": false, \"hideZero\": false, \"max\": - false, \"min\": false, \"rightSide\": true, \"show\": true, \"total\": false, - \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"interval\": \"\", \"intervalFactor\": 1, \"legendFormat\": - \"P50\", \"refId\": \"A\" }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P90\", - \"refId\": \"B\" }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\",destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}[1m])) by (le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"P99\", - \"refId\": \"C\" } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, - \"title\": \"Request Duration\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"cacheTimeout\": null, - \"colorBackground\": false, \"colorValue\": false, \"colors\": [ \"#299c46\", - \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": \"Prometheus\", \"format\": - \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": 0, \"show\": false, \"thresholdLabels\": - false, \"thresholdMarkers\": true }, \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": - 0, \"y\": 7 }, \"id\": 84, \"interval\": null, \"links\": [], \"mappingType\": - 1, \"mappingTypes\": [ { \"name\": \"value to text\", \"value\": 1 }, { \"name\": - \"range to text\", \"value\": 2 } ], \"maxDataPoints\": 100, \"nullPointMode\": - \"connected\", \"nullText\": null, \"postfix\": \"\", \"postfixFontSize\": \"50%\", - \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": [ { \"from\": \"null\", - \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": { \"fillColor\": \"rgba(31, - 118, 189, 0.18)\", \"full\": true, \"lineColor\": \"rgb(31, 120, 193)\", \"show\": - true }, \"tableColumn\": \"\", \"targets\": [ { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\"}[1m])) - + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\"}[1m]))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"\", \"refId\": \"A\" - } ], \"thresholds\": \"\", \"title\": \"TCP Server Traffic\", \"transparent\": - false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", \"valueMaps\": [ - { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], \"valueName\": \"avg\" - }, { \"cacheTimeout\": null, \"colorBackground\": false, \"colorValue\": false, - \"colors\": [ \"#299c46\", \"rgba(237, 129, 40, 0.89)\", \"#d44a3a\" ], \"datasource\": - \"Prometheus\", \"format\": \"Bps\", \"gauge\": { \"maxValue\": 100, \"minValue\": - 0, \"show\": false, \"thresholdLabels\": false, \"thresholdMarkers\": true }, - \"gridPos\": { \"h\": 4, \"w\": 12, \"x\": 12, \"y\": 7 }, \"id\": 85, \"interval\": - null, \"links\": [], \"mappingType\": 1, \"mappingTypes\": [ { \"name\": \"value - to text\", \"value\": 1 }, { \"name\": \"range to text\", \"value\": 2 } ], \"maxDataPoints\": - 100, \"nullPointMode\": \"connected\", \"nullText\": null, \"postfix\": \"\", - \"postfixFontSize\": \"50%\", \"prefix\": \"\", \"prefixFontSize\": \"50%\", \"rangeMaps\": - [ { \"from\": \"null\", \"text\": \"N/A\", \"to\": \"null\" } ], \"sparkline\": - { \"fillColor\": \"rgba(31, 118, 189, 0.18)\", \"full\": true, \"lineColor\": - \"rgb(31, 120, 193)\", \"show\": true }, \"tableColumn\": \"\", \"targets\": [ - { \"expr\": \"sum(irate(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\"}[1m])) + sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\"}[1m]))\", - \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"\", \"refId\": \"A\" } ], \"thresholds\": \"\", \"title\": \"TCP Client Traffic\", - \"transparent\": false, \"type\": \"singlestat\", \"valueFontSize\": \"80%\", - \"valueMaps\": [ { \"op\": \"=\", \"text\": \"N/A\", \"value\": \"null\" } ], - \"valueName\": \"avg\" }, { \"content\": \"
\\nINBOUND - WORKLOADS\\n
\", \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": - 11 }, \"id\": 45, \"links\": [], \"mode\": \"html\", \"title\": \"\", \"transparent\": - true, \"type\": \"text\" }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 14 }, \"id\": 25, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": false, - \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": - 1, \"links\": [], \"nullPointMode\": \"null as zero\", \"percentage\": false, - \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} : {{ response_code }} (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - reporter=\\\"destination\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace, response_code), 0.001)\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - source_workload }}.{{ source_workload_namespace }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Incoming Requests by Source And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 14 }, \"id\": 26, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[5m])) by (source_workload, source_workload_namespace) - / sum(rate(istio_requests_total{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload_namespace=~\\\"$namespace\\\", destination_workload=~\\\"$workload\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[5m])) - by (source_workload, source_workload_namespace)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": - [], \"timeFrom\": null, \"timeShift\": null, \"title\": \"Incoming Success Rate - (non-5xx responses) By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, - \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": 1, \"max\": \"1.01\", - \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"description\": \"\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": - 0, \"y\": 20 }, \"id\": 27, \"legend\": { \"alignAsTable\": false, \"avg\": false, - \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": false, - \"min\": false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": - false }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": - \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": - \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Incoming Request Duration by Source\", \"tooltip\": { \"shared\": true, \"sort\": - 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": - null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": - [ { \"format\": \"s\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, - \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 20 }, \"id\": - 28, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P90 (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95 (\U0001F510mTLS)\", \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - \ P99 (\U0001F510mTLS)\", \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P50\", \"refId\": \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P90\", \"refId\": \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P95\", \"refId\": \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, - sum(irate(istio_request_bytes_bucket{reporter=\\\"destination\\\", connection_security_policy!=\\\"mutual_tls\\\", - destination_workload=~\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace, le))\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{source_workload}}.{{source_workload_namespace}} - P99\", \"refId\": \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Incoming Request Size By Source\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": - \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": - false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": - 8, \"x\": 16, \"y\": 20 }, \"id\": 68, \"legend\": { \"alignAsTable\": false, - \"avg\": false, \"current\": false, \"hideEmpty\": true, \"max\": false, \"min\": - false, \"rightSide\": false, \"show\": true, \"total\": false, \"values\": false - }, \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50 (\U0001F510mTLS)\", \"refId\": - \"D\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90 (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95 (\U0001F510mTLS)\", \"refId\": - \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99 (\U0001F510mTLS)\", \"refId\": - \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P50\", \"refId\": \"E\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P90\", \"refId\": \"F\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P95\", \"refId\": \"G\", \"step\": - 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload=~\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$srcwl\\\", - source_workload_namespace=~\\\"$srcns\\\"}[1m])) by (source_workload, source_workload_namespace, - le))\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": - \"{{source_workload}}.{{source_workload_namespace}} P99\", \"refId\": \"H\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Response Size By Source\", \"tooltip\": { \"shared\": true, \"sort\": 0, \"value_type\": - \"individual\" }, \"type\": \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": - \"time\", \"name\": null, \"show\": true, \"values\": [] }, \"yaxes\": [ { \"format\": - \"decbytes\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", - \"show\": true }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, - \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": - 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 26 }, \"id\": 80, \"legend\": - { \"avg\": false, \"current\": false, \"max\": false, \"min\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload - }}.{{ source_workload_namespace}} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": - 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"destination\\\", - connection_security_policy!=\\\"mutual_tls\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Received from Incoming TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 26 }, \"id\": - 82, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}} - (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"destination\\\", destination_workload_namespace=~\\\"$namespace\\\", - destination_workload=~\\\"$workload\\\", source_workload=~\\\"$srcwl\\\", source_workload_namespace=~\\\"$srcns\\\"}[1m])) - by (source_workload, source_workload_namespace), 0.001)\", \"format\": \"time_series\", - \"intervalFactor\": 1, \"legendFormat\": \"{{ source_workload }}.{{ source_workload_namespace}}\", - \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Bytes Sent to Incoming TCP Connection\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"content\": - \"
\\nOUTBOUND SERVICES\\n
\", - \"gridPos\": { \"h\": 3, \"w\": 24, \"x\": 0, \"y\": 32 }, \"id\": 69, \"links\": - [], \"mode\": \"html\", \"title\": \"\", \"transparent\": true, \"type\": \"text\" - }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, - \"datasource\": \"Prometheus\", \"fill\": 0, \"gridPos\": { \"h\": 6, \"w\": 12, - \"x\": 0, \"y\": 35 }, \"id\": 70, \"legend\": { \"avg\": false, \"current\": - false, \"hideEmpty\": true, \"max\": false, \"min\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null as zero\", \"percentage\": false, \"pointradius\": 5, - \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": 1, - \"legendFormat\": \"{{ destination_service }} : {{ response_code }} (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_requests_total{connection_security_policy!=\\\"mutual_tls\\\", - source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - reporter=\\\"source\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) by (destination_service, - response_code), 0.001)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} : {{ response_code }}\", \"refId\": - \"A\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Requests by Destination And Response Code\", \"tooltip\": - { \"shared\": false, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": - \"graph\", \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, - \"show\": true, \"values\": [ \"total\" ] }, \"yaxes\": [ { \"format\": \"ops\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": \"0\", \"show\": true - }, { \"format\": \"short\", \"label\": null, \"logBase\": 1, \"max\": null, \"min\": - null, \"show\": false } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": - 10, \"dashes\": false, \"datasource\": \"Prometheus\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 35 }, \"id\": 71, \"legend\": { \"avg\": - false, \"current\": false, \"hideEmpty\": true, \"hideZero\": false, \"max\": - false, \"min\": false, \"show\": true, \"total\": false, \"values\": false }, - \"lines\": true, \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", - \"percentage\": false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", - \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": - false, \"targets\": [ { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\",response_code!~\\\"5.*\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service) / sum(irate(istio_requests_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[5m])) - by (destination_service)\", \"format\": \"time_series\", \"hide\": false, \"intervalFactor\": - 1, \"legendFormat\": \"{{destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Outgoing Success Rate (non-5xx responses) By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"percentunit\", \"label\": null, \"logBase\": - 1, \"max\": \"1.01\", \"min\": \"0\", \"show\": true }, { \"format\": \"short\", - \"label\": null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false - } ] }, { \"aliasColors\": {}, \"bars\": false, \"dashLength\": 10, \"dashes\": - false, \"datasource\": \"Prometheus\", \"description\": \"\", \"fill\": 1, \"gridPos\": - { \"h\": 6, \"w\": 8, \"x\": 0, \"y\": 41 }, \"id\": 72, \"legend\": { \"alignAsTable\": - false, \"avg\": false, \"current\": false, \"hideEmpty\": true, \"hideZero\": - false, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": true, \"total\": - false, \"values\": false }, \"lines\": true, \"linewidth\": 1, \"links\": [], - \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": 5, \"points\": - false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": 10, \"stack\": - false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_duration_seconds_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Duration by Destination\", \"tooltip\": { - \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"s\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 8, \"y\": 41 }, \"id\": - 73, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_request_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Outgoing Request Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 8, \"x\": 16, \"y\": 41 }, \"id\": - 74, \"legend\": { \"alignAsTable\": false, \"avg\": false, \"current\": false, - \"hideEmpty\": true, \"max\": false, \"min\": false, \"rightSide\": false, \"show\": - true, \"total\": false, \"values\": false }, \"lines\": true, \"linewidth\": 1, - \"links\": [], \"nullPointMode\": \"null\", \"percentage\": false, \"pointradius\": - 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": [], \"spaceLength\": - 10, \"stack\": false, \"steppedLine\": false, \"targets\": [ { \"expr\": \"histogram_quantile(0.50, - sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", connection_security_policy=\\\"mutual_tls\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service, le))\", \"format\": - \"time_series\", \"hide\": false, \"intervalFactor\": 1, \"legendFormat\": \"{{ - destination_service }} P50 (\U0001F510mTLS)\", \"refId\": \"D\", \"step\": 2 }, - { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90 (\U0001F510mTLS)\", - \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95 (\U0001F510mTLS)\", - \"refId\": \"B\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99 (\U0001F510mTLS)\", - \"refId\": \"C\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.50, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P50\", \"refId\": - \"E\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.90, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P90\", \"refId\": - \"F\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.95, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P95\", \"refId\": - \"G\", \"step\": 2 }, { \"expr\": \"histogram_quantile(0.99, sum(irate(istio_response_bytes_bucket{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload=~\\\"$workload\\\", - source_workload_namespace=~\\\"$namespace\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service, le))\", \"format\": \"time_series\", \"hide\": false, - \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service }} P99\", \"refId\": - \"H\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": - null, \"title\": \"Response Size By Destination\", \"tooltip\": { \"shared\": - true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"decbytes\", \"label\": null, \"logBase\": 1, - \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": false } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 0, \"y\": 47 }, \"id\": - 76, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }} (\U0001F510mTLS)\", \"refId\": \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_sent_bytes_total{connection_security_policy!=\\\"mutual_tls\\\", - reporter=\\\"source\\\", source_workload_namespace=~\\\"$namespace\\\", source_workload=~\\\"$workload\\\", - destination_service=~\\\"$dstsvc\\\"}[1m])) by (destination_service), 0.001)\", - \"format\": \"time_series\", \"intervalFactor\": 1, \"legendFormat\": \"{{ destination_service - }}\", \"refId\": \"B\", \"step\": 2 } ], \"thresholds\": [], \"timeFrom\": null, - \"timeShift\": null, \"title\": \"Bytes Sent on Outgoing TCP Connection\", \"tooltip\": - { \"shared\": true, \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", - \"xaxis\": { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": - true, \"values\": [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": - 1, \"max\": null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": - null, \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] }, { \"aliasColors\": - {}, \"bars\": false, \"dashLength\": 10, \"dashes\": false, \"datasource\": \"Prometheus\", - \"fill\": 1, \"gridPos\": { \"h\": 6, \"w\": 12, \"x\": 12, \"y\": 47 }, \"id\": - 78, \"legend\": { \"avg\": false, \"current\": false, \"max\": false, \"min\": - false, \"show\": true, \"total\": false, \"values\": false }, \"lines\": true, - \"linewidth\": 1, \"links\": [], \"nullPointMode\": \"null\", \"percentage\": - false, \"pointradius\": 5, \"points\": false, \"renderer\": \"flot\", \"seriesOverrides\": - [], \"spaceLength\": 10, \"stack\": false, \"steppedLine\": false, \"targets\": - [ { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }} (\U0001F510mTLS)\", \"refId\": - \"A\", \"step\": 2 }, { \"expr\": \"round(sum(irate(istio_tcp_received_bytes_total{reporter=\\\"source\\\", - connection_security_policy!=\\\"mutual_tls\\\", source_workload_namespace=~\\\"$namespace\\\", - source_workload=~\\\"$workload\\\", destination_service=~\\\"$dstsvc\\\"}[1m])) - by (destination_service), 0.001)\", \"format\": \"time_series\", \"intervalFactor\": - 1, \"legendFormat\": \"{{ destination_service }}\", \"refId\": \"B\", \"step\": - 2 } ], \"thresholds\": [], \"timeFrom\": null, \"timeShift\": null, \"title\": - \"Bytes Received from Outgoing TCP Connection\", \"tooltip\": { \"shared\": true, - \"sort\": 0, \"value_type\": \"individual\" }, \"type\": \"graph\", \"xaxis\": - { \"buckets\": null, \"mode\": \"time\", \"name\": null, \"show\": true, \"values\": - [] }, \"yaxes\": [ { \"format\": \"Bps\", \"label\": null, \"logBase\": 1, \"max\": - null, \"min\": \"0\", \"show\": true }, { \"format\": \"short\", \"label\": null, - \"logBase\": 1, \"max\": null, \"min\": null, \"show\": true } ] } ], \"refresh\": - \"10s\", \"schemaVersion\": 16, \"style\": \"dark\", \"tags\": [], \"templating\": - { \"list\": [ { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", - \"hide\": 0, \"includeAll\": false, \"label\": \"Namespace\", \"multi\": false, - \"name\": \"namespace\", \"options\": [], \"query\": \"query_result(sum(istio_requests_total) - by (destination_workload_namespace) or sum(istio_tcp_sent_bytes_total) by (destination_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*_namespace=\\\"([^\\\"]*).*/\", \"sort\": 0, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": false, \"label\": \"Workload\", \"multi\": false, \"name\": - \"workload\", \"options\": [], \"query\": \"query_result((sum(istio_requests_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_requests_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)) or (sum(istio_tcp_sent_bytes_total{destination_workload_namespace=~\\\"$namespace\\\"}) - by (destination_workload) or sum(istio_tcp_sent_bytes_total{source_workload_namespace=~\\\"$namespace\\\"}) - by (source_workload)))\", \"refresh\": 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", - \"sort\": 1, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false }, { \"allValue\": null, \"current\": {}, \"datasource\": - \"Prometheus\", \"hide\": 0, \"includeAll\": true, \"label\": \"Inbound Workload - Namespace\", \"multi\": true, \"name\": \"srcns\", \"options\": [], \"query\": - \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace) - or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", destination_workload=\\\"$workload\\\", - destination_workload_namespace=~\\\"$namespace\\\"}) by (source_workload_namespace))\", - \"refresh\": 1, \"regex\": \"/.*namespace=\\\"([^\\\"]*).*/\", \"sort\": 2, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Inbound Workload\", \"multi\": true, \"name\": - \"srcwl\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload) or sum(istio_tcp_sent_bytes_total{reporter=\\\"destination\\\", - destination_workload=\\\"$workload\\\", destination_workload_namespace=~\\\"$namespace\\\", - source_workload_namespace=~\\\"$srcns\\\"}) by (source_workload))\", \"refresh\": - 1, \"regex\": \"/.*workload=\\\"([^\\\"]*).*/\", \"sort\": 3, \"tagValuesQuery\": - \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": \"query\", \"useTags\": false - }, { \"allValue\": null, \"current\": {}, \"datasource\": \"Prometheus\", \"hide\": - 0, \"includeAll\": true, \"label\": \"Destination Service\", \"multi\": true, - \"name\": \"dstsvc\", \"options\": [], \"query\": \"query_result( sum(istio_requests_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service) or sum(istio_tcp_sent_bytes_total{reporter=\\\"source\\\", - source_workload=~\\\"$workload\\\", source_workload_namespace=~\\\"$namespace\\\"}) - by (destination_service))\", \"refresh\": 1, \"regex\": \"/.*destination_service=\\\"([^\\\"]*).*/\", - \"sort\": 4, \"tagValuesQuery\": \"\", \"tags\": [], \"tagsQuery\": \"\", \"type\": - \"query\", \"useTags\": false } ] }, \"time\": { \"from\": \"now-5m\", \"to\": - \"now\" }, \"timepicker\": { \"refresh_intervals\": [ \"5s\", \"10s\", \"30s\", - \"1m\", \"5m\", \"15m\", \"30m\", \"1h\", \"2h\", \"1d\" ], \"time_options\": - [ \"5m\", \"15m\", \"1h\", \"6h\", \"12h\", \"24h\", \"2d\", \"7d\", \"30d\" ] - }, \"timezone\": \"\", \"title\": \"Istio Workload Dashboard\", \"uid\": \"UbsSZTDik\", - \"version\": 1 } " -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-istio-workload-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml deleted file mode 100644 index 9a7f42a256..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-mixer-dashboard.yaml +++ /dev/null @@ -1,359 +0,0 @@ -apiVersion: v1 -data: - mixer-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "limit": - 100, "name": "Annotations & Alerts", "showIn": 0, "type": "dashboard" } ] }, "editable": - false, "gnetId": null, "graphTooltip": 1, "id": null, "iteration": 1543881232533, - "links": [], "panels": [ { "content": "

Deployed Versions

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": "40", "id": 62, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 5, "w": 24, "x": 0, "y": 3 }, "id": 64, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(istio_build{component=\"mixer\"}) by (tag)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ tag }}", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Mixer Versions", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "content": "

Resource Usage

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(process_virtual_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "instant": false, "intervalFactor": 2, "legendFormat": - "Virtual Memory ({{ job }})", "refId": "I" }, { "expr": "sum(process_resident_memory_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident - Memory ({{ job }})", "refId": "H" }, { "expr": "sum(go_memstats_heap_sys_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap sys ({{ job }})", "refId": "A" }, { "expr": "sum(go_memstats_heap_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": - "heap alloc ({{ job }})", "refId": "D" }, { "expr": "sum(go_memstats_alloc_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Alloc - ({{ job }})", "refId": "F" }, { "expr": "sum(go_memstats_heap_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "Heap in-use ({{ job }})", "refId": "E" }, { "expr": "sum(go_memstats_stack_inuse_bytes{job=~\"istio-telemetry|istio-policy\"}) - by (job)", "format": "time_series", "intervalFactor": 2, "legendFormat": "Stack - in-use ({{ job }})", "refId": "G" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (service)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "C" }, { "expr": "sum(label_replace(container_memory_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Memory", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "bytes", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": 11 }, "id": 6, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (pod_name), \"service\", - \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ service }} total (k8s)", - "refId": "A" }, { "expr": "label_replace(sum(rate(container_cpu_usage_seconds_total{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}[1m])) by (container_name, pod_name), - \"service\", \"$1\" , \"pod_name\", \"(istio-telemetry|istio-policy)-.*\")", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "{{ service - }} - {{ container_name }} (k8s)", "refId": "B" }, { "expr": "sum(irate(process_cpu_seconds_total{job=~\"istio-telemetry|istio-policy\"}[1m])) - by (job)", "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": - "{{ job }} (self-reported)", "refId": "C" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(process_open_fds{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "hide": true, "instant": false, "interval": "", "intervalFactor": - 2, "legendFormat": "Open FDs ({{ job }})", "refId": "A" }, { "expr": "sum(label_replace(container_fs_usage_bytes{container_name=~\"mixer|istio-proxy\", - pod_name=~\"istio-telemetry-.*|istio-policy-.*\"}, \"service\", \"$1\" , \"pod_name\", - \"(istio-telemetry|istio-policy)-.*\")) by (container_name, service)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "{{ service }} - {{ container_name - }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Disk", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "bytes", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "decimals": null, "format": "none", - "label": "", "logBase": 1024, "max": null, "min": null, "show": false } ], "yaxis": - { "align": false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 7, "w": 6, "x": 18, "y": 11 }, "id": 4, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": false, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(go_goroutines{job=~\"istio-telemetry|istio-policy\"}) by (job)", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines ({{ - job }})", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Mixer Overview

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 18 }, "height": "40px", "id": 30, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 0, "y": 21 }, "id": 9, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "mixer (Total)", - "refId": "B" }, { "expr": "sum(rate(grpc_io_server_completed_rpcs[1m])) by (grpc_server_method)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "mixer ({{ grpc_server_method - }})", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Incoming Requests", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 6, "x": 6, "y": 21 }, "id": 8, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [ { - "alias": "{}", "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": - false, "targets": [ { "expr": "histogram_quantile(0.5, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.5", "refId": "B" }, { "expr": "histogram_quantile(0.9, - sum(rate(grpc_io_server_server_latency_bucket{}[1m])) by (grpc_server_method, - le))", "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ grpc_server_method - }} 0.9", "refId": "C" }, { "expr": "histogram_quantile(0.99, sum(rate(grpc_io_server_server_latency_bucket{}[1m])) - by (grpc_server_method, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ grpc_server_method }} 0.99", "refId": "D" } ], "thresholds": [], "timeFrom": - null, "timeShift": null, "title": "Response Durations", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "ms", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": false } ], "yaxis": { "align": false, "alignLevel": null } }, { - "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": - "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 12, "y": 21 }, "id": - 11, "legend": { "avg": false, "current": false, "max": false, "min": false, "show": - true, "total": false, "values": false }, "lines": true, "linewidth": 1, "links": - [], "nullPointMode": "null", "percentage": false, "pointradius": 5, "points": - false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, "stack": - false, "steppedLine": false, "targets": [ { "expr": "sum(rate(grpc_server_handled_total{grpc_code=~\"Unknown|Unimplemented|Internal|DataLoss\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Server Error Rate (5xx responses)", "tooltip": { - "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 6, "w": 6, "x": 18, "y": - 21 }, "id": 12, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(irate(grpc_server_handled_total{grpc_code!=\"OK\",grpc_service=~\".*Mixer\"}[1m])) - by (grpc_method)", "format": "time_series", "intervalFactor": 2, "legendFormat": - "Mixer {{ grpc_method }}", "refId": "B" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Non-successes (4xxs)", "tooltip": { "shared": true, - "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } }, { "content": - "

Adapters and Config

", "gridPos": { "h": 3, "w": 24, - "x": 0, "y": 27 }, "id": 28, "links": [], "mode": "html", "title": "", "transparent": - true, "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, - "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": - 12, "x": 0, "y": 30 }, "id": 13, "legend": { "avg": false, "current": false, "max": - false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(mixer_runtime_dispatches_total{adapter=~\"$adapter\"}[1m])) by (adapter)", - "format": "time_series", "intervalFactor": 2, "legendFormat": "{{ adapter }}", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Adapter Dispatch Count", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 30 }, "id": 14, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "histogram_quantile(0.5, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p50", "refId": "A" }, { "expr": "histogram_quantile(0.9, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p90 ", "refId": "B" }, { "expr": "histogram_quantile(0.99, sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=~\"$adapter\"}[1m])) - by (adapter, le))", "format": "time_series", "intervalFactor": 2, "legendFormat": - "{{ adapter }} - p99", "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Adapter Dispatch Duration", "tooltip": { "shared": true, "sort": - 1, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "s", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, { - "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - false } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 37 }, "id": 60, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "scalar(topk(1, max(mixer_config_rule_config_count) by - (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": "Rules", - "refId": "A" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Config Errors", "refId": "B" }, { "expr": "scalar(topk(1, max(mixer_config_rule_config_match_error_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Match Errors", "refId": "C" }, { "expr": "scalar(topk(1, max(mixer_config_unsatisfied_action_handler_count) - by (configID)))", "format": "time_series", "intervalFactor": 1, "legendFormat": - "Unsatisfied Actions", "refId": "D" } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Rules", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 6, "y": 37 }, "id": 56, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_instance_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Instances", "refId": "A" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Instances - in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 37 }, "id": 54, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_handler_config_count) by (configID)))", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Handlers", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Handlers in - Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 18, "y": 37 }, "id": 58, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "scalar(topk(1, max(mixer_config_attribute_count) by (configID)))", "format": - "time_series", "instant": false, "intervalFactor": 1, "legendFormat": "Attributes", - "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Attributes in Latest Config", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Individual Adapters

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 44 }, "id": 23, "links": [], "mode": - "html", "title": "", "transparent": true, "type": "text" }, { "collapsed": false, - "gridPos": { "h": 1, "w": 24, "x": 0, "y": 47 }, "id": 46, "panels": [], "repeat": - "adapter", "title": "$adapter Adapter", "type": "row" }, { "aliasColors": {}, - "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 12, "x": 0, "y": 48 }, "id": 17, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "label_replace(irate(mixer_runtime_dispatches_total{adapter=\"$adapter\"}[1m]),\"handler\", - \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", "format": "time_series", - "intervalFactor": 2, "legendFormat": "{{ handler }} (error: {{ error }})", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Dispatch - Count By Handler", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 12, "x": 12, "y": 48 }, "id": 18, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(histogram_quantile(0.5, sum(rate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p50 - {{ handler_short - }} (error: {{ error }})", "refId": "A" }, { "expr": "label_replace(histogram_quantile(0.9, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p90 - {{ handler_short - }} (error: {{ error }})", "refId": "D" }, { "expr": "label_replace(histogram_quantile(0.99, - sum(irate(mixer_runtime_dispatch_duration_seconds_bucket{adapter=\"$adapter\"}[1m])) - by (handler, error, le)), \"handler_short\", \"$1 ($3)\", \"handler\", \"(.*)\\\\.(.*)\\\\.(.*)\")", - "format": "time_series", "intervalFactor": 2, "legendFormat": "p99 - {{ handler_short - }} (error: {{ error }})", "refId": "E" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Dispatch Duration By Handler", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "s", "label": null, "logBase": 1, "max": null, "min": null, "show": - true }, { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true } ], "yaxis": { "align": false, "alignLevel": null } } ], "refresh": - "5s", "schemaVersion": 16, "style": "dark", "tags": [], "templating": { "list": - [ { "allValue": null, "current": {}, "datasource": "Prometheus", "hide": 0, "includeAll": - true, "label": "Adapter", "multi": true, "name": "adapter", "options": [], "query": - "label_values(adapter)", "refresh": 2, "regex": "", "sort": 1, "tagValuesQuery": - "", "tags": [], "tagsQuery": "", "type": "query", "useTags": false } ] }, "time": - { "from": "now-5m", "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", - "10s", "30s", "1m", "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ - "5m", "15m", "1h", "6h", "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "", - "title": "Istio Mixer Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-mixer-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml deleted file mode 100644 index 32987ba7de..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-configuration-dashboards-pilot-dashboard.yaml +++ /dev/null @@ -1,307 +0,0 @@ -apiVersion: v1 -data: - pilot-dashboard.json: '{ "__inputs": [ { "name": "DS_PROMETHEUS", "label": "Prometheus", - "description": "", "type": "datasource", "pluginId": "prometheus", "pluginName": - "Prometheus" } ], "__requires": [ { "type": "grafana", "id": "grafana", "name": - "Grafana", "version": "5.2.3" }, { "type": "panel", "id": "graph", "name": "Graph", - "version": "5.0.0" }, { "type": "datasource", "id": "prometheus", "name": "Prometheus", - "version": "5.0.0" }, { "type": "panel", "id": "text", "name": "Text", "version": - "5.0.0" } ], "annotations": { "list": [ { "builtIn": 1, "datasource": "-- Grafana - --", "enable": true, "hide": true, "iconColor": "rgba(0, 211, 255, 1)", "name": - "Annotations & Alerts", "type": "dashboard" } ] }, "editable": false, "gnetId": - null, "graphTooltip": 1, "id": null, "links": [], "panels": [ { "content": "

Deployed - Versions

", "gridPos": { "h": 3, "w": 24, "x": 0, "y": 0 }, "height": - "40", "id": 58, "links": [], "mode": "html", "title": "", "transparent": true, - "type": "text" }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": - false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 5, "w": 24, "x": - 0, "y": 3 }, "id": 56, "legend": { "avg": false, "current": false, "max": false, - "min": false, "show": true, "total": false, "values": false }, "lines": true, - "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": - 5, "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": - 10, "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(istio_build{component=\"pilot\"}) - by (tag)", "format": "time_series", "intervalFactor": 1, "legendFormat": "{{ tag - }}", "refId": "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, - "title": "Pilot Versions", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

Resource Usage

", - "gridPos": { "h": 3, "w": 24, "x": 0, "y": 8 }, "height": "40", "id": 29, "links": - [], "mode": "html", "title": "", "transparent": true, "type": "text" }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 0, "y": 11 }, "id": 5, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "process_virtual_memory_bytes{job=\"pilot\"}", "format": - "time_series", "instant": false, "intervalFactor": 2, "legendFormat": "Virtual - Memory", "refId": "I", "step": 2 }, { "expr": "process_resident_memory_bytes{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Resident Memory", - "refId": "H", "step": 2 }, { "expr": "go_memstats_heap_sys_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - sys", "refId": "A" }, { "expr": "go_memstats_heap_alloc_bytes{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 2, "legendFormat": "heap - alloc", "refId": "D" }, { "expr": "go_memstats_alloc_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Alloc", "refId": "F", "step": - 2 }, { "expr": "go_memstats_heap_inuse_bytes{job=\"pilot\"}", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "Heap in-use", "refId": "E", - "step": 2 }, { "expr": "go_memstats_stack_inuse_bytes{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Stack in-use", "refId": "G", - "step": 2 }, { "expr": "sum(container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"})", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "Total (k8s)", "refId": "C", "step": 2 }, { "expr": "container_memory_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "hide": false, "intervalFactor": - 2, "legendFormat": "{{ container_name }} (k8s)", "refId": "B", "step": 2 } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Memory", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "bytes", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 6, "y": - 11 }, "id": 6, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m]))", "format": "time_series", "hide": false, - "intervalFactor": 2, "legendFormat": "Total (k8s)", "refId": "A", "step": 2 }, - { "expr": "sum(rate(container_cpu_usage_seconds_total{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}[1m])) by (container_name)", "format": "time_series", - "hide": false, "intervalFactor": 2, "legendFormat": "{{ container_name }} (k8s)", - "refId": "B", "step": 2 }, { "expr": "irate(process_cpu_seconds_total{job=\"pilot\"}[1m])", - "format": "time_series", "hide": false, "intervalFactor": 2, "legendFormat": "pilot - (self-reported)", "refId": "C", "step": 2 } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "CPU", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 6, "x": 12, "y": 11 }, "id": 7, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "process_open_fds{job=\"pilot\"}", "format": "time_series", "hide": true, "instant": - false, "interval": "", "intervalFactor": 2, "legendFormat": "Open FDs (pilot)", - "refId": "A" }, { "expr": "container_fs_usage_bytes{container_name=~\"discovery|istio-proxy\", - pod_name=~\"istio-pilot-.*\"}", "format": "time_series", "intervalFactor": 2, - "legendFormat": "{{ container_name }}", "refId": "B", "step": 2 } ], "thresholds": - [], "timeFrom": null, "timeShift": null, "title": "Disk", "tooltip": { "shared": - true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": - null, "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { - "format": "bytes", "label": "", "logBase": 1, "max": null, "min": null, "show": - true }, { "decimals": null, "format": "none", "label": "", "logBase": 1024, "max": - null, "min": null, "show": false } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 6, "x": 18, "y": - 11 }, "id": 4, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": false, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "go_goroutines{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 2, "legendFormat": "Number of Goroutines", - "refId": "A", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": - null, "title": "Goroutines", "tooltip": { "shared": true, "sort": 0, "value_type": - "individual" }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": - null, "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": "", - "logBase": 1, "max": null, "min": null, "show": true }, { "format": "short", "label": - null, "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "content": "

xDS

", "gridPos": - { "h": 3, "w": 24, "x": 0, "y": 18 }, "id": 28, "links": [], "mode": "html", "title": - "", "transparent": true, "type": "text" }, { "aliasColors": {}, "bars": false, - "dashLength": 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": - { "h": 6, "w": 8, "x": 0, "y": 21 }, "id": 40, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(irate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m]))", "format": - "time_series", "hide": false, "intervalFactor": 1, "legendFormat": "XDS GRPC Successes", - "refId": "C" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Updates", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "ops", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 8, "y": 21 }, "id": 42, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "round(sum(rate(envoy_cluster_update_attempt{cluster_name=\"xds-grpc\"}[1m])) - - sum(rate(envoy_cluster_update_success{cluster_name=\"xds-grpc\"}[1m])))", "format": - "time_series", "intervalFactor": 2, "legendFormat": "XDS GRPC ", "refId": "A", - "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Failures", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "ops", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": false } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 6, "w": 8, "x": 16, "y": 21 }, "id": 41, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "sum(envoy_cluster_upstream_cx_active{cluster_name=\"xds-grpc\"})", "format": - "time_series", "intervalFactor": 2, "legendFormat": "Pilot (XDS GRPC)", "refId": - "C", "step": 2 } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": - "Active Connections", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 8, "w": 8, "x": 0, "y": 27 }, "id": 45, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "pilot_conflict_inbound_listener{job=\"pilot\"}", "format": "time_series", "intervalFactor": - 1, "legendFormat": "Inbound Listeners", "refId": "B" }, { "expr": "pilot_conflict_outbound_listener_http_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (http over current tcp)", "refId": "A" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_tcp{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current tcp)", "refId": "C" }, { "expr": "pilot_conflict_outbound_listener_tcp_over_current_http{job=\"pilot\"}", - "format": "time_series", "intervalFactor": 1, "legendFormat": "Outbound Listeners - (tcp over current http)", "refId": "D" } ], "thresholds": [], "timeFrom": null, - "timeShift": null, "title": "Conflicts", "tooltip": { "shared": true, "sort": - 0, "value_type": "individual" }, "type": "graph", "xaxis": { "buckets": null, - "mode": "time", "name": null, "show": true, "values": [] }, "yaxes": [ { "format": - "short", "label": null, "logBase": 1, "max": null, "min": null, "show": true }, - { "format": "short", "label": null, "logBase": 1, "max": null, "min": null, "show": - true } ], "yaxis": { "align": false, "alignLevel": null } }, { "aliasColors": - {}, "bars": false, "dashLength": 10, "dashes": false, "datasource": "Prometheus", - "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 8, "y": 27 }, "id": 47, "legend": - { "avg": false, "current": false, "max": false, "min": false, "show": true, "total": - false, "values": false }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": - "null", "percentage": false, "pointradius": 5, "points": false, "renderer": "flot", - "seriesOverrides": [], "spaceLength": 10, "stack": false, "steppedLine": false, - "targets": [ { "expr": "pilot_virt_services{job=\"pilot\"}", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Virtual Services", "refId": "A" }, { "expr": - "pilot_services{job=\"pilot\"}", "format": "time_series", "intervalFactor": 1, - "legendFormat": "Services", "refId": "B" }, { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "hide": true, "intervalFactor": 1, "legendFormat": "Rejected CDS Configs - {{ - node }}: {{ err }}", "refId": "C" }, { "expr": "pilot_xds_eds_reject{job=\"pilot\"}", - "format": "time_series", "hide": true, "intervalFactor": 1, "legendFormat": "Rejected - EDS Configs", "refId": "D" }, { "expr": "pilot_xds{job=\"pilot\"}", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Connected Endpoints", "refId": - "E" }, { "expr": "rate(pilot_xds_write_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Write Timeouts", "refId": - "F" }, { "expr": "rate(pilot_xds_push_timeout{job=\"pilot\"}[1m])", "format": - "time_series", "intervalFactor": 1, "legendFormat": "Push Timeouts", "refId": - "G" }, { "expr": "rate(pilot_xds_pushes{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Pushes ({{ type }})", "refId": "H" }, { - "expr": "rate(pilot_xds_push_errors{job=\"pilot\"}[1m])", "format": "time_series", - "intervalFactor": 1, "legendFormat": "Push Errors ({{ type }})", "refId": "I" - } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "ADS Monitoring", - "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, "type": - "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": true, - "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true }, { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 8, "w": 8, "x": 16, "y": - 27 }, "id": 49, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_cds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{ err }})", "refId": "A" } - ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected CDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 0, "y": 35 }, "id": 52, "legend": { "avg": false, "current": false, - "max": false, "min": false, "show": true, "total": false, "values": false }, "lines": - true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": false, - "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": [], - "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_eds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected EDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": {}, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 8, "y": - 35 }, "id": 54, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [], "spaceLength": 10, - "stack": false, "steppedLine": false, "targets": [ { "expr": "label_replace(sum(pilot_xds_lds_reject{job=\"pilot\"}) - by (node, err), \"node\", \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", - "intervalFactor": 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], - "thresholds": [], "timeFrom": null, "timeShift": null, "title": "Rejected LDS - Configs", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" }, - "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, "show": - true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } }, { "aliasColors": {}, "bars": false, "dashLength": - 10, "dashes": false, "datasource": "Prometheus", "fill": 1, "gridPos": { "h": - 7, "w": 8, "x": 16, "y": 35 }, "id": 53, "legend": { "avg": false, "current": - false, "max": false, "min": false, "show": true, "total": false, "values": false - }, "lines": true, "linewidth": 1, "links": [], "nullPointMode": "null", "percentage": - false, "pointradius": 5, "points": false, "renderer": "flot", "seriesOverrides": - [], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": [ { "expr": - "label_replace(sum(pilot_xds_rds_reject{job=\"pilot\"}) by (node, err), \"node\", - \"$1\", \"node\", \".*~.*~(.*)~.*\")", "format": "time_series", "intervalFactor": - 1, "legendFormat": "{{ node }} ({{err}})", "refId": "A" } ], "thresholds": [], - "timeFrom": null, "timeShift": null, "title": "Rejected RDS Configs", "tooltip": - { "shared": true, "sort": 0, "value_type": "individual" }, "type": "graph", "xaxis": - { "buckets": null, "mode": "time", "name": null, "show": true, "values": [] }, - "yaxes": [ { "format": "short", "label": null, "logBase": 1, "max": null, "min": - null, "show": true }, { "format": "short", "label": null, "logBase": 1, "max": - null, "min": null, "show": true } ], "yaxis": { "align": false, "alignLevel": - null } }, { "aliasColors": { "outbound|80||default-http-backend.kube-system.svc.cluster.local": - "rgba(255, 255, 255, 0.97)" }, "bars": false, "dashLength": 10, "dashes": false, - "datasource": "Prometheus", "fill": 1, "gridPos": { "h": 7, "w": 8, "x": 0, "y": - 42 }, "id": 51, "legend": { "avg": false, "current": false, "max": false, "min": - false, "show": true, "total": false, "values": false }, "lines": true, "linewidth": - 1, "links": [], "nullPointMode": "null", "percentage": false, "pointradius": 5, - "points": false, "renderer": "flot", "seriesOverrides": [ { "alias": "outbound|80||default-http-backend.kube-system.svc.cluster.local", - "yaxis": 1 } ], "spaceLength": 10, "stack": false, "steppedLine": false, "targets": - [ { "expr": "sum(pilot_xds_eds_instances{job=\"pilot\"}) by (cluster)", "format": - "time_series", "intervalFactor": 1, "legendFormat": "{{ cluster }}", "refId": - "A" } ], "thresholds": [], "timeFrom": null, "timeShift": null, "title": "EDS - Instances", "tooltip": { "shared": true, "sort": 0, "value_type": "individual" - }, "type": "graph", "xaxis": { "buckets": null, "mode": "time", "name": null, - "show": true, "values": [] }, "yaxes": [ { "format": "short", "label": null, "logBase": - 1, "max": null, "min": null, "show": true }, { "format": "short", "label": null, - "logBase": 1, "max": null, "min": null, "show": true } ], "yaxis": { "align": - false, "alignLevel": null } } ], "refresh": "5s", "schemaVersion": 16, "style": - "dark", "tags": [], "templating": { "list": [] }, "time": { "from": "now-5m", - "to": "now" }, "timepicker": { "refresh_intervals": [ "5s", "10s", "30s", "1m", - "5m", "15m", "30m", "1h", "2h", "1d" ], "time_options": [ "5m", "15m", "1h", "6h", - "12h", "24h", "2d", "7d", "30d" ] }, "timezone": "browser", "title": "Istio Pilot - Dashboard", "version": 4 } ' -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-configuration-dashboards-pilot-dashboard - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml deleted file mode 100644 index 6329dad866..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana-custom-resources.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - apiVersion: authentication.istio.io/v1alpha1 - kind: Policy - metadata: - name: grafana-ports-mtls-disabled - namespace: istio-system - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - spec: - targets: - - name: grafana - ports: - - number: 3000 - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana-custom-resources - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana.yaml deleted file mode 100644 index 251c4e2669..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-grafana.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -data: - dashboardproviders.yaml: | - apiVersion: 1 - providers: - - disableDeletion: false - folder: istio - name: istio - options: - path: /var/lib/grafana/dashboards/istio - orgId: 1 - type: file - datasources.yaml: | - apiVersion: 1 - datasources: - - access: proxy - editable: true - isDefault: true - jsonData: - timeInterval: 5s - name: Prometheus - orgId: 1 - type: prometheus - url: http://prometheus:9090 -kind: ConfigMap -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - istio: grafana - release: istio - name: istio-grafana - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml deleted file mode 100644 index 337758a25f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-security-custom-resources.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: v1 -data: - custom-resources.yaml: |- - # Authentication policy to enable permissive mode for all services (that have sidecar) in the mesh. - apiVersion: "authentication.istio.io/v1alpha1" - kind: "MeshPolicy" - metadata: - name: "default" - labels: - app: security - chart: security - heritage: Tiller - release: istio - spec: - peers: - - mtls: - mode: PERMISSIVE - run.sh: |- - #!/bin/sh - - set -x - - if [ "$#" -ne "1" ]; then - echo "first argument should be path to custom resource yaml" - exit 1 - fi - - pathToResourceYAML=${1} - - kubectl get validatingwebhookconfiguration istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - echo "istio-galley validatingwebhookconfiguration found - waiting for istio-galley deployment to be ready" - while true; do - kubectl -n istio-system get deployment istio-galley 2>/dev/null - if [ "$?" -eq 0 ]; then - break - fi - sleep 1 - done - kubectl -n istio-system rollout status deployment istio-galley - if [ "$?" -ne 0 ]; then - echo "istio-galley deployment rollout status check failed" - exit 1 - fi - echo "istio-galley deployment ready for configuration validation" - fi - sleep 5 - kubectl apply -f ${pathToResourceYAML} -kind: ConfigMap -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-security-custom-resources - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml deleted file mode 100644 index 03832c4720..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio-sidecar-injector.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: v1 -data: - config: "policy: enabled\ntemplate: |-\n rewriteAppHTTPProbe: false\n initContainers:\n - \ [[ if ne (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"NONE\" ]]\n - name: istio-init\n image: \"docker.io/istio/proxy_init:1.1.6\"\n - \ args:\n - \"-p\"\n - [[ .MeshConfig.ProxyListenPort ]]\n - \"-u\"\n - \ - 1337\n - \"-m\"\n - [[ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` - .ProxyConfig.InterceptionMode ]]\n - \"-i\"\n - \"[[ annotation .ObjectMeta - `traffic.sidecar.istio.io/includeOutboundIPRanges` \"*\" ]]\"\n - \"-x\"\n - \ - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/excludeOutboundIPRanges` - \ \"\" ]]\"\n - \"-b\"\n - \"[[ annotation .ObjectMeta `traffic.sidecar.istio.io/includeInboundPorts` - (includeInboundPorts .Spec.Containers) ]]\"\n - \"-d\"\n - \"[[ excludeInboundPort - (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 ) (annotation .ObjectMeta - `traffic.sidecar.istio.io/excludeInboundPorts` \"\" ) ]]\"\n [[ if (isset - .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces`) -]]\n - - \"-k\"\n - \"[[ index .ObjectMeta.Annotations `traffic.sidecar.istio.io/kubevirtInterfaces` - ]]\"\n [[ end -]]\n imagePullPolicy: IfNotPresent\n resources:\n requests:\n - \ cpu: 10m\n memory: 10Mi\n limits:\n cpu: 100m\n memory: - 50Mi\n securityContext:\n runAsUser: 0\n runAsNonRoot: false\n capabilities:\n - \ add:\n - NET_ADMIN\n restartPolicy: Always\n [[ end -]]\n containers:\n - \ - name: istio-proxy\n image: [[ annotation .ObjectMeta `sidecar.istio.io/proxyImage` - \ \"docker.io/istio/proxyv2:1.1.6\" ]]\n ports:\n - containerPort: 15090\n - \ protocol: TCP\n name: http-envoy-prom\n args:\n - proxy\n - - sidecar\n - --domain\n - $(POD_NAMESPACE).svc.cluster.local\n - --configPath\n - \ - [[ .ProxyConfig.ConfigPath ]]\n - --binaryPath\n - [[ .ProxyConfig.BinaryPath - ]]\n - --serviceCluster\n [[ if ne \"\" (index .ObjectMeta.Labels \"app\") - -]]\n - [[ index .ObjectMeta.Labels \"app\" ]].$(POD_NAMESPACE)\n [[ else - -]]\n - [[ valueOrDefault .DeploymentMeta.Name \"istio-proxy\" ]].[[ valueOrDefault - .DeploymentMeta.Namespace \"default\" ]]\n [[ end -]]\n - --drainDuration\n - \ - [[ formatDuration .ProxyConfig.DrainDuration ]]\n - --parentShutdownDuration\n - \ - [[ formatDuration .ProxyConfig.ParentShutdownDuration ]]\n - --discoveryAddress\n - \ - [[ annotation .ObjectMeta `sidecar.istio.io/discoveryAddress` .ProxyConfig.DiscoveryAddress - ]]\n - --zipkinAddress\n - [[ .ProxyConfig.GetTracing.GetZipkin.GetAddress - ]]\n - --connectTimeout\n - [[ formatDuration .ProxyConfig.ConnectTimeout - ]]\n - --proxyAdminPort\n - [[ .ProxyConfig.ProxyAdminPort ]]\n [[ if - gt .ProxyConfig.Concurrency 0 -]]\n - --concurrency\n - [[ .ProxyConfig.Concurrency - ]]\n [[ end -]]\n - --controlPlaneAuthPolicy\n - [[ annotation .ObjectMeta - `sidecar.istio.io/controlPlaneAuthPolicy` .ProxyConfig.ControlPlaneAuthPolicy - ]]\n [[- if (ne (annotation .ObjectMeta `status.sidecar.istio.io/port` 15020 - ) \"0\") ]]\n - --statusPort\n - [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n - --applicationPorts\n - \"[[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/applicationPorts` - (applicationPorts .Spec.Containers) ]]\"\n [[- end ]]\n env:\n - name: - POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - \ - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: - metadata.namespace\n - name: INSTANCE_IP\n valueFrom:\n fieldRef:\n - \ fieldPath: status.podIP\n \n - name: ISTIO_META_POD_NAME\n valueFrom:\n - \ fieldRef:\n fieldPath: metadata.name\n - name: ISTIO_META_CONFIG_NAMESPACE\n - \ valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n - \ - name: ISTIO_META_INTERCEPTION_MODE\n value: [[ or (index .ObjectMeta.Annotations - \"sidecar.istio.io/interceptionMode\") .ProxyConfig.InterceptionMode.String ]]\n - \ [[ if .ObjectMeta.Annotations ]]\n - name: ISTIO_METAJSON_ANNOTATIONS\n - \ value: |\n [[ toJSON .ObjectMeta.Annotations ]]\n [[ end - ]]\n [[ if .ObjectMeta.Labels ]]\n - name: ISTIO_METAJSON_LABELS\n value: - |\n [[ toJSON .ObjectMeta.Labels ]]\n [[ end ]]\n [[- if (isset - .ObjectMeta.Annotations `sidecar.istio.io/bootstrapOverride`) ]]\n - name: - ISTIO_BOOTSTRAP_OVERRIDE\n value: \"/etc/istio/custom-bootstrap/custom_bootstrap.json\"\n - \ [[- end ]]\n imagePullPolicy: IfNotPresent\n [[ if (ne (annotation .ObjectMeta - `status.sidecar.istio.io/port` 15020 ) \"0\") ]]\n readinessProbe:\n httpGet:\n - \ path: /healthz/ready\n port: [[ annotation .ObjectMeta `status.sidecar.istio.io/port` - \ 15020 ]]\n initialDelaySeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/initialDelaySeconds` - \ 1 ]]\n periodSeconds: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/periodSeconds` - \ 2 ]]\n failureThreshold: [[ annotation .ObjectMeta `readiness.status.sidecar.istio.io/failureThreshold` - \ 30 ]]\n [[ end -]]securityContext:\n readOnlyRootFilesystem: true\n - \ [[ if eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) - \"TPROXY\" -]]\n capabilities:\n add:\n - NET_ADMIN\n runAsGroup: - 1337\n [[ else -]]\n \n runAsUser: 1337\n [[- end ]]\n resources:\n - \ [[ if or (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) (isset - .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) -]]\n requests:\n - \ [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU`) -]]\n - \ cpu: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyCPU` ]]\"\n - \ [[ end ]]\n [[ if (isset .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory`) - -]]\n memory: \"[[ index .ObjectMeta.Annotations `sidecar.istio.io/proxyMemory` - ]]\"\n [[ end ]]\n [[ else -]]\n limits:\n cpu: 2000m\n - \ memory: 128Mi\n requests:\n cpu: 10m\n memory: 40Mi\n - \ \n [[ end -]]\n volumeMounts:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - mountPath: /etc/istio/custom-bootstrap\n - \ name: custom-bootstrap-volume\n [[- end ]]\n - mountPath: /etc/istio/proxy\n - \ name: istio-envoy\n - mountPath: /etc/certs/\n name: istio-certs\n - \ readOnly: true\n [[- if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount` - ]]\n [[ range $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolumeMount`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 4 ]]\n [[ - end ]]\n [[- end ]]\n volumes:\n [[- if (isset .ObjectMeta.Annotations - `sidecar.istio.io/bootstrapOverride`) ]]\n - name: custom-bootstrap-volume\n - \ configMap:\n name: [[ annotation .ObjectMeta `sidecar.istio.io/bootstrapOverride` - `` ]]\n [[- end ]]\n - emptyDir:\n medium: Memory\n name: istio-envoy\n - \ - name: istio-certs\n secret:\n optional: true\n [[ if eq .Spec.ServiceAccountName - \"\" -]]\n secretName: istio.default\n [[ else -]]\n secretName: - [[ printf \"istio.%s\" .Spec.ServiceAccountName ]]\n [[ end -]]\n [[- - if isset .ObjectMeta.Annotations `sidecar.istio.io/userVolume` ]]\n [[ range - $index, $value := fromJSON (index .ObjectMeta.Annotations `sidecar.istio.io/userVolume`) - ]]\n - name: \"[[ $index ]]\"\n [[ toYaml $value | indent 2 ]]\n [[ end - ]]\n [[ end ]]" -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio.yaml deleted file mode 100644 index be0ffff1af..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_istio.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: v1 -data: - mesh: "# Set the following variable to true to disable policy checks by the Mixer.\n# - Note that metrics will still be reported to the Mixer.\ndisablePolicyChecks: false\n\n# - Set enableTracing to false to disable request tracing.\nenableTracing: true\n\n# - Set accessLogFile to empty string to disable access log.\naccessLogFile: \"/dev/stdout\"\n\n# - If accessLogEncoding is TEXT, value will be used directly as the log format\n# - example: \"[%START_TIME%] %REQ(:METHOD)% %REQ(X-ENVOY-ORIGINAL-PATH?:PATH)% %PROTOCOL%\\n\"\n# - If AccessLogEncoding is JSON, value will be parsed as map[string]string\n# example: - '{\"start_time\": \"%START_TIME%\", \"req_method\": \"%REQ(:METHOD)%\"}'\n# Leave - empty to use default log format\naccessLogFormat: \"\"\n\n# Set accessLogEncoding - to JSON or TEXT to configure sidecar access log\naccessLogEncoding: 'TEXT'\nmixerCheckServer: - istio-policy.istio-system.svc.cluster.local:9091\nmixerReportServer: istio-telemetry.istio-system.svc.cluster.local:9091\n# - policyCheckFailOpen allows traffic in cases when the mixer policy service cannot - be reached.\n# Default is false which means the traffic is denied when the client - is unable to connect to Mixer.\npolicyCheckFailOpen: false\n# Let Pilot give ingresses - the public IP of the Istio ingressgateway\ningressService: istio-ingressgateway\n\n# - Default connect timeout for dynamic clusters generated by Pilot and returned via - XDS\nconnectTimeout: 10s\n\n# DNS refresh rate for Envoy clusters of type STRICT_DNS\ndnsRefreshRate: - 5s\n\n# Unix Domain Socket through which envoy communicates with NodeAgent SDS - to get\n# key/cert for mTLS. Use secret-mount files instead of SDS if set to empty. - \nsdsUdsPath: \n\n# This flag is used by secret discovery service(SDS). \n# If - set to true(prerequisite: https://kubernetes.io/docs/concepts/storage/volumes/#projected), - Istio will inject volumes mount \n# for k8s service account JWT, so that K8s API - server mounts k8s service account JWT to envoy container, which \n# will be used - to generate key/cert eventually. This isn't supported for non-k8s case.\nenableSdsTokenMount: - false\n\n# This flag is used by secret discovery service(SDS). \n# If set to true, - envoy will fetch normal k8s service account JWT from '/var/run/secrets/kubernetes.io/serviceaccount/token' - \n# (https://kubernetes.io/docs/tasks/access-application-cluster/access-cluster/#accessing-the-api-from-a-pod) - \n# and pass to sds server, which will be used to request key/cert eventually. - \n# this flag is ignored if enableSdsTokenMount is set.\n# This isn't supported - for non-k8s case.\nsdsUseK8sSaJwt: false\n\n# The trust domain corresponds to - the trust root of a system.\n# Refer to https://github.com/spiffe/spiffe/blob/master/standards/SPIFFE-ID.md#21-trust-domain\ntrustDomain: - \n\n# Set the default behavior of the sidecar for handling outbound traffic from - the application:\n# ALLOW_ANY - outbound traffic to unknown destinations will - be allowed, in case there are no\n# services or ServiceEntries for the destination - port\n# REGISTRY_ONLY - restrict outbound traffic to services defined in the service - registry as well\n# as those defined through ServiceEntries \noutboundTrafficPolicy:\n - \ mode: ALLOW_ANY\n\nlocalityLbSetting:\n {}\n \n\n# The namespace to treat - as the administrative root namespace for istio\n# configuration. \nrootNamespace: - istio-system\nconfigSources:\n- address: istio-galley.istio-system.svc:9901\n\ndefaultConfig:\n - \ #\n # TCP connection timeout between Envoy & the application, and between Envoys. - \ Used for static clusters\n # defined in Envoy's configuration file\n connectTimeout: - 10s\n #\n ### ADVANCED SETTINGS #############\n # Where should envoy's configuration - be stored in the istio-proxy container\n configPath: \"/etc/istio/proxy\"\n binaryPath: - \"/usr/local/bin/envoy\"\n # The pseudo service name used for Envoy.\n serviceCluster: - istio-proxy\n # These settings that determine how long an old Envoy\n # process - should be kept alive after an occasional reload.\n drainDuration: 45s\n parentShutdownDuration: - 1m0s\n #\n # The mode used to redirect inbound connections to Envoy. This setting\n - \ # has no effect on outbound traffic: iptables REDIRECT is always used for\n - \ # outbound connections.\n # If \"REDIRECT\", use iptables REDIRECT to NAT and - redirect to Envoy.\n # The \"REDIRECT\" mode loses source addresses during redirection.\n - \ # If \"TPROXY\", use iptables TPROXY to redirect to Envoy.\n # The \"TPROXY\" - mode preserves both the source and destination IP\n # addresses and ports, so - that they can be used for advanced filtering\n # and manipulation.\n # The \"TPROXY\" - mode also configures the sidecar to run with the\n # CAP_NET_ADMIN capability, - which is required to use TPROXY.\n #interceptionMode: REDIRECT\n #\n # Port - where Envoy listens (on local host) for admin commands\n # You can exec into - the istio-proxy container in a pod and\n # curl the admin port (curl http://localhost:15000/) - to obtain\n # diagnostic information from Envoy. See\n # https://lyft.github.io/envoy/docs/operations/admin.html\n - \ # for more details\n proxyAdminPort: 15000\n #\n # Set concurrency to a specific - number to control the number of Proxy worker threads.\n # If set to 0 (default), - then start worker thread for each CPU thread/core.\n concurrency: 2\n #\n tracing:\n - \ zipkin:\n # Address of the Zipkin collector\n address: zipkin.istio-system:9411\n - \ #\n # Mutual TLS authentication between sidecars and istio control plane.\n - \ controlPlaneAuthPolicy: NONE\n #\n # Address where istio Pilot service is - running\n discoveryAddress: istio-pilot.istio-system:15010" - meshNetworks: 'networks: {}' -kind: ConfigMap -metadata: - labels: - app: istio - chart: istio - heritage: Tiller - release: istio - name: istio - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_kiali.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_kiali.yaml deleted file mode 100644 index ec52e4be53..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - config.yaml: "istio_namespace: istio-system\nserver:\n port: 20001\nexternal_services:\n - \ istio:\n url_service_version: http://istio-pilot:8080/version\n jaeger:\n - \ url: \n grafana:\n url: \n" -kind: ConfigMap -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_prometheus.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_prometheus.yaml deleted file mode 100644 index 1a06e2ff6c..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_configmap_prometheus.yaml +++ /dev/null @@ -1,313 +0,0 @@ -apiVersion: v1 -data: - prometheus.yml: |- - global: - scrape_interval: 15s - scrape_configs: - - - job_name: 'istio-mesh' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;prometheus - - # Scrape config for envoy stats - - job_name: 'envoy-stats' - metrics_path: /stats/prometheus - kubernetes_sd_configs: - - role: pod - - relabel_configs: - - source_labels: [__meta_kubernetes_pod_container_port_name] - action: keep - regex: '.*-envoy-prom' - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:15090 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - metric_relabel_configs: - # Exclude some of the envoy metrics that have massive cardinality - # This list may need to be pruned further moving forward, as informed - # by performance and scalability testing. - - source_labels: [ cluster_name ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ tcp_prefix ] - regex: '(outbound|inbound|prometheus_stats).*' - action: drop - - source_labels: [ listener_address ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_listener_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ http_conn_manager_prefix ] - regex: '(.+)' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tls.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_tcp_downstream.*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_http_(stats|admin).*' - action: drop - - source_labels: [ __name__ ] - regex: 'envoy_cluster_(lb|retry|bind|internal|max|original).*' - action: drop - - - job_name: 'istio-policy' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-policy;http-monitoring - - - job_name: 'istio-telemetry' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-telemetry;http-monitoring - - - job_name: 'pilot' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-pilot;http-monitoring - - - job_name: 'galley' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-galley;http-monitoring - - - job_name: 'citadel' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - istio-system - - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: istio-citadel;http-monitoring - - # scrape config for API servers - - job_name: 'kubernetes-apiservers' - kubernetes_sd_configs: - - role: endpoints - namespaces: - names: - - default - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - relabel_configs: - - source_labels: [__meta_kubernetes_service_name, __meta_kubernetes_endpoint_port_name] - action: keep - regex: kubernetes;https - - # scrape config for nodes (kubelet) - - job_name: 'kubernetes-nodes' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics - - # Scrape config for Kubelet cAdvisor. - # - # This is required for Kubernetes 1.7.3 and later, where cAdvisor metrics - # (those whose names begin with 'container_') have been removed from the - # Kubelet metrics endpoint. This job scrapes the cAdvisor endpoint to - # retrieve those metrics. - # - # In Kubernetes 1.7.0-1.7.2, these metrics are only exposed on the cAdvisor - # HTTP endpoint; use "replacement: /api/v1/nodes/${1}:4194/proxy/metrics" - # in that case (and ensure cAdvisor's HTTP server hasn't been disabled with - # the --cadvisor-port=0 Kubelet flag). - # - # This job is not necessary and should be removed in Kubernetes 1.6 and - # earlier versions, or it will cause the metrics to be scraped twice. - - job_name: 'kubernetes-cadvisor' - scheme: https - tls_config: - ca_file: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt - bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token - kubernetes_sd_configs: - - role: node - relabel_configs: - - action: labelmap - regex: __meta_kubernetes_node_label_(.+) - - target_label: __address__ - replacement: kubernetes.default.svc:443 - - source_labels: [__meta_kubernetes_node_name] - regex: (.+) - target_label: __metrics_path__ - replacement: /api/v1/nodes/${1}/proxy/metrics/cadvisor - - # scrape config for service endpoints. - - job_name: 'kubernetes-service-endpoints' - kubernetes_sd_configs: - - role: endpoints - relabel_configs: - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scrape] - action: keep - regex: true - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_scheme] - action: replace - target_label: __scheme__ - regex: (https?) - - source_labels: [__meta_kubernetes_service_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_service_annotation_prometheus_io_port] - action: replace - target_label: __address__ - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - - action: labelmap - regex: __meta_kubernetes_service_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: kubernetes_namespace - - source_labels: [__meta_kubernetes_service_name] - action: replace - target_label: kubernetes_name - - - job_name: 'kubernetes-pods' - kubernetes_sd_configs: - - role: pod - relabel_configs: # If first two labels are present, pod should be scraped by the istio-secure job. - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # Keep target if there's no sidecar or if prometheus.io/scheme is explicitly set to "http" - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: keep - regex: ((;.*)|(.*;http)) - - source_labels: [__meta_kubernetes_pod_annotation_istio_mtls] - action: drop - regex: (true) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name - - - job_name: 'kubernetes-pods-istio-secure' - scheme: https - tls_config: - ca_file: /etc/istio-certs/root-cert.pem - cert_file: /etc/istio-certs/cert-chain.pem - key_file: /etc/istio-certs/key.pem - insecure_skip_verify: true # prometheus does not support secure naming. - kubernetes_sd_configs: - - role: pod - relabel_configs: - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scrape] - action: keep - regex: true - # sidecar status annotation is added by sidecar injector and - # istio_workload_mtls_ability can be specifically placed on a pod to indicate its ability to receive mtls traffic. - - source_labels: [__meta_kubernetes_pod_annotation_sidecar_istio_io_status, __meta_kubernetes_pod_annotation_istio_mtls] - action: keep - regex: (([^;]+);([^;]*))|(([^;]*);(true)) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_scheme] - action: drop - regex: (http) - - source_labels: [__meta_kubernetes_pod_annotation_prometheus_io_path] - action: replace - target_label: __metrics_path__ - regex: (.+) - - source_labels: [__address__] # Only keep address that is host:port - action: keep # otherwise an extra target with ':443' is added for https scheme - regex: ([^:]+):(\d+) - - source_labels: [__address__, __meta_kubernetes_pod_annotation_prometheus_io_port] - action: replace - regex: ([^:]+)(?::\d+)?;(\d+) - replacement: $1:$2 - target_label: __address__ - - action: labelmap - regex: __meta_kubernetes_pod_label_(.+) - - source_labels: [__meta_kubernetes_namespace] - action: replace - target_label: namespace - - source_labels: [__meta_kubernetes_pod_name] - action: replace - target_label: pod_name -kind: ConfigMap -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_namespace_istio-system.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_namespace_istio-system.yaml deleted file mode 100644 index 072bd0fd7a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_namespace_istio-system.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - istio-injection: disabled - name: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_secret_kiali.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_secret_kiali.yaml deleted file mode 100644 index c96321c013..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_secret_kiali.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - passphrase: YWRtaW4= - username: YWRtaW4= -kind: Secret -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -type: Opaque diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_grafana.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_grafana.yaml deleted file mode 100644 index ddc7dbff72..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_grafana.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: grafana - namespace: istio-system -spec: - ports: - - name: http - port: 3000 - protocol: TCP - targetPort: 3000 - selector: - app: grafana - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-citadel.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-citadel.yaml deleted file mode 100644 index 4215ecb031..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-citadel.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: security - chart: security - heritage: Tiller - istio: citadel - release: istio - name: istio-citadel - namespace: istio-system -spec: - ports: - - name: grpc-citadel - port: 8060 - protocol: TCP - targetPort: 8060 - - name: http-monitoring - port: 15014 - selector: - istio: citadel diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-egressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-egressgateway.yaml deleted file mode 100644 index 4998a7f877..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-egressgateway.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - istio: egressgateway - release: istio - name: istio-egressgateway - namespace: istio-system -spec: - ports: - - name: http2 - port: 80 - - name: https - port: 443 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-egressgateway - istio: egressgateway - release: istio - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-galley.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-galley.yaml deleted file mode 100644 index e037f828d3..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-galley.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - istio: galley - release: istio - name: istio-galley - namespace: istio-system -spec: - ports: - - name: https-validation - port: 443 - - name: http-monitoring - port: 15014 - - name: grpc-mcp - port: 9901 - selector: - istio: galley diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-ingressgateway.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-ingressgateway.yaml deleted file mode 100644 index 5833ac81fa..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-ingressgateway.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - beta.cloud.google.com/backend-config: '{"ports": {"http2":"iap-backendconfig"}}' - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - istio: ingressgateway - release: istio - name: istio-ingressgateway - namespace: istio-system -spec: - ports: - - name: status-port - port: 15020 - targetPort: 15020 - - name: http2 - nodePort: 31380 - port: 80 - targetPort: 80 - - name: https - nodePort: 31390 - port: 443 - - name: tcp - nodePort: 31400 - port: 31400 - - name: https-kiali - port: 15029 - targetPort: 15029 - - name: https-prometheus - port: 15030 - targetPort: 15030 - - name: https-grafana - port: 15031 - targetPort: 15031 - - name: https-tracing - port: 15032 - targetPort: 15032 - - name: tls - port: 15443 - targetPort: 15443 - selector: - app: istio-ingressgateway - istio: ingressgateway - release: istio - type: NodePort diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-pilot.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-pilot.yaml deleted file mode 100644 index 20b0a6b506..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-pilot.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - istio: pilot - release: istio - name: istio-pilot - namespace: istio-system -spec: - ports: - - name: grpc-xds - port: 15010 - - name: https-xds - port: 15011 - - name: http-legacy-discovery - port: 8080 - - name: http-monitoring - port: 15014 - selector: - istio: pilot diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-policy.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-policy.yaml deleted file mode 100644 index 31ff71c40b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-policy.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-policy - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - selector: - istio: mixer - istio-mixer-type: policy diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml deleted file mode 100644 index 877561ec4a..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-sidecar-injector.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector - namespace: istio-system -spec: - ports: - - port: 443 - selector: - istio: sidecar-injector diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-telemetry.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-telemetry.yaml deleted file mode 100644 index eebbbe6978..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_istio-telemetry.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - networking.istio.io/exportTo: '*' - labels: - app: mixer - chart: mixer - heritage: Tiller - istio: mixer - release: istio - name: istio-telemetry - namespace: istio-system -spec: - ports: - - name: grpc-mixer - port: 9091 - - name: grpc-mixer-mtls - port: 15004 - - name: http-monitoring - port: 15014 - - name: prometheus - port: 42422 - selector: - istio: mixer - istio-mixer-type: telemetry diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-agent.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-agent.yaml deleted file mode 100644 index 1dfd5cd653..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-agent.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: agent-service - release: istio - name: jaeger-agent - namespace: istio-system -spec: - clusterIP: None - ports: - - name: agent-zipkin-thrift - port: 5775 - protocol: UDP - targetPort: 5775 - - name: agent-compact - port: 6831 - protocol: UDP - targetPort: 6831 - - name: agent-binary - port: 6832 - protocol: UDP - targetPort: 6832 - selector: - app: jaeger diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-collector.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-collector.yaml deleted file mode 100644 index 5f4aeccfb5..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-collector.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: collector-service - release: istio - name: jaeger-collector - namespace: istio-system -spec: - ports: - - name: jaeger-collector-tchannel - port: 14267 - protocol: TCP - targetPort: 14267 - - name: jaeger-collector-http - port: 14268 - protocol: TCP - targetPort: 14268 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-query.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-query.yaml deleted file mode 100644 index 94a9e9d15b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_jaeger-query.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - jaeger-infra: jaeger-service - release: istio - name: jaeger-query - namespace: istio-system -spec: - ports: - - name: query-http - port: 16686 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_kiali.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_kiali.yaml deleted file mode 100644 index 049f4c74d7..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_kiali.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali - namespace: istio-system -spec: - ports: - - name: http-kiali - port: 20001 - protocol: TCP - selector: - app: kiali diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_prometheus.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_prometheus.yaml deleted file mode 100644 index f0ecb03d63..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_prometheus.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/scrape: "true" - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system -spec: - ports: - - name: http-prometheus - port: 9090 - protocol: TCP - selector: - app: prometheus diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_tracing.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_tracing.yaml deleted file mode 100644 index 973e98032f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_tracing.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: null - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: tracing - namespace: istio-system -spec: - ports: - - name: http-query - port: 80 - protocol: TCP - targetPort: 16686 - selector: - app: jaeger diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_zipkin.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_zipkin.yaml deleted file mode 100644 index 43acf02148..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_service_zipkin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: jaeger - chart: tracing - heritage: Tiller - release: istio - name: zipkin - namespace: istio-system -spec: - ports: - - name: http - port: 9411 - protocol: TCP - targetPort: 9411 - selector: - app: jaeger - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml deleted file mode 100644 index 8cf250f0d0..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-citadel-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-citadel-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml deleted file mode 100644 index ab525f7ced..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-cleanup-secrets-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - annotations: - helm.sh/hook: post-delete - helm.sh/hook-delete-policy: hook-succeeded - helm.sh/hook-weight: "1" - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-cleanup-secrets-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml deleted file mode 100644 index 5581b918c1..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-egressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-egressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-egressgateway-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml deleted file mode 100644 index adb8c1a617..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-galley-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: galley - chart: galley - heritage: Tiller - release: istio - name: istio-galley-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml deleted file mode 100644 index 94a0b1f0ac..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-grafana-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: grafana - chart: grafana - heritage: Tiller - release: istio - name: istio-grafana-post-install-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml deleted file mode 100644 index ad9a81526f..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-ingressgateway-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: istio-ingressgateway - chart: gateways - heritage: Tiller - release: istio - name: istio-ingressgateway-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml deleted file mode 100644 index c0c452e957..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-mixer-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: mixer - chart: mixer - heritage: Tiller - release: istio - name: istio-mixer-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml deleted file mode 100644 index 2ae58c18b5..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-multi.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: istio-multi - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml deleted file mode 100644 index e6b9404cda..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-pilot-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pilot - chart: pilot - heritage: Tiller - release: istio - name: istio-pilot-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml deleted file mode 100644 index c844263f93..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-security-post-install-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: security - chart: security - heritage: Tiller - release: istio - name: istio-security-post-install-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml deleted file mode 100644 index e40f71183b..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_istio-sidecar-injector-service-account.yaml +++ /dev/null @@ -1,11 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: sidecarInjectorWebhook - chart: sidecarInjectorWebhook - heritage: Tiller - istio: sidecar-injector - release: istio - name: istio-sidecar-injector-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml deleted file mode 100644 index 6a40ec8143..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_kiali-service-account.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: kiali - chart: kiali - heritage: Tiller - release: istio - name: kiali-service-account - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_prometheus.yaml b/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_prometheus.yaml deleted file mode 100644 index 2ad4d98808..0000000000 --- a/tests/tests/legacy_kustomizations/istio-install/test_data/expected/~g_v1_serviceaccount_prometheus.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: prometheus - chart: prometheus - heritage: Tiller - release: istio - name: prometheus - namespace: istio-system diff --git a/tests/tests/legacy_kustomizations/istio/kustomize_test.go b/tests/tests/legacy_kustomizations/istio/kustomize_test.go deleted file mode 100644 index eb4aa1c3b1..0000000000 --- a/tests/tests/legacy_kustomizations/istio/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package istio - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/istio", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml deleted file mode 100644 index 761c72b28c..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_gateway_kubeflow-gateway.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - name: kubeflow-gateway - namespace: kubeflow -spec: - selector: - istio: ingressgateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml deleted file mode 100644 index 8b72b89b40..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-api-entry - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml deleted file mode 100644 index 25a4323d96..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_serviceentry_google-storage-api-entry.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: ServiceEntry -metadata: - name: google-storage-api-entry - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - location: MESH_EXTERNAL - ports: - - name: https - number: 443 - protocol: HTTPS - resolution: DNS diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml deleted file mode 100644 index 962ff0ad0f..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-api-vs - namespace: kubeflow -spec: - hosts: - - www.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - www.googleapis.com - route: - - destination: - host: www.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml deleted file mode 100644 index 0a36119b53..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_google-storage-api-vs.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: google-storage-api-vs - namespace: kubeflow -spec: - hosts: - - storage.googleapis.com - tls: - - match: - - port: 443 - sni_hosts: - - storage.googleapis.com - route: - - destination: - host: storage.googleapis.com - port: - number: 443 - weight: 100 diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml deleted file mode 100644 index f3c49cca8e..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/networking.istio.io_v1alpha3_virtualservice_grafana-vs.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - name: grafana-vs - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - method: - exact: GET - uri: - prefix: /istio/grafana/ - rewrite: - uri: / - route: - - destination: - host: grafana.istio-system.svc.cluster.local - port: - number: 3000 diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml deleted file mode 100644 index b9f424a12f..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-admin.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-istio-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml deleted file mode 100644 index fa0a1943e0..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-istio-admin: "true" - name: kubeflow-istio-edit -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml deleted file mode 100644 index daf4419193..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-istio-view.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-istio-view -rules: -- apiGroups: - - istio.io - - networking.istio.io - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml deleted file mode 100644 index 426f7f76c3..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/rbac.istio.io_v1alpha1_clusterrbacconfig_default.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ClusterRbacConfig -metadata: - name: default - namespace: kubeflow -spec: - exclusion: - namespaces: - - istio-system - mode: "ON" diff --git a/tests/tests/legacy_kustomizations/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml b/tests/tests/legacy_kustomizations/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml deleted file mode 100644 index 67b828a5ee..0000000000 --- a/tests/tests/legacy_kustomizations/istio/test_data/expected/~g_v1_configmap_istio-parameters-797cg68672.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -data: - clusterRbacConfig: "ON" - gatewaySelector: ingressgateway -kind: ConfigMap -metadata: - annotations: {} - labels: {} - name: istio-parameters-797cg68672 - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/kustomize_test.go b/tests/tests/legacy_kustomizations/jupyter-web-app/kustomize_test.go deleted file mode 100644 index 7ea68231fa..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package jupyter_web_app - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/jupyter-web-app", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml deleted file mode 100644 index 339bf99f2f..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/app.k8s.io_v1beta1_application_jupyter-web-app.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: jupyter-web-app - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: networking.istio.io - kind: VirtualService - descriptor: - description: Provides a UI which allows the user to create/conect/delete jupyter - notebooks. - keywords: - - jupyterhub - - jupyter ui - - notebooks - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/jupyter-web-app - - description: Docs - url: https://www.kubeflow.org/docs/notebooks - maintainers: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - owners: - - email: kimwnasptd@arrikto.com - name: Kimonas Sotirchos - type: jupyter-web-app - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/name: jupyter-web-app diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml deleted file mode 100644 index 6a4959de5b..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/apps_v1_deployment_jupyter-web-app-deployment.yaml +++ /dev/null @@ -1,69 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - spec: - containers: - - env: - - name: ROK_SECRET_NAME - valueFrom: - configMapKeyRef: - key: ROK_SECRET_NAME - name: jupyter-web-app-parameters - - name: UI - valueFrom: - configMapKeyRef: - key: UI - name: jupyter-web-app-parameters - - name: USERID_HEADER - value: X-Goog-Authenticated-User-Email - - name: USERID_PREFIX - value: 'accounts.google.com:' - image: gcr.io/kubeflow-images-public/jupyter-web-app:vmaster-ge4456300 - imagePullPolicy: Always - name: jupyter-web-app - ports: - - containerPort: 5000 - volumeMounts: - - mountPath: /etc/config - name: config-volume - serviceAccountName: jupyter-web-app-service-account - volumes: - - configMap: - name: jupyter-web-app-jupyter-web-app-config - name: config-volume diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml deleted file mode 100644 index 73f9c61c35..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/networking.istio.io_v1alpha3_virtualservice_jupyter-web-app.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: jupyter-web-app - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /jupyter - match: - - uri: - prefix: /jupyter/ - rewrite: - uri: / - route: - - destination: - host: jupyter-web-app-service.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml deleted file mode 100644 index 5277c8e8cc..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-cluster-role.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role -rules: -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - create - - delete -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete -- apiGroups: - - "" - resources: - - persistentvolumeclaims - verbs: - - create - - delete - - get - - list -- apiGroups: - - "" - resources: - - events - verbs: - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml deleted file mode 100644 index bc04fb4906..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-admin.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: jupyter-web-app-kubeflow-notebook-ui-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml deleted file mode 100644 index d6dc2e5e35..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-edit.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: jupyter-web-app-kubeflow-notebook-ui-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list - - create - - delete diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml deleted file mode 100644 index 0820ee1112..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_jupyter-web-app-kubeflow-notebook-ui-view.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: jupyter-web-app-kubeflow-notebook-ui-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/finalizers - - poddefaults - verbs: - - get - - list -- apiGroups: - - storage.k8s.io - resources: - - storageclasses - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml deleted file mode 100644 index 07e9a818c0..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_jupyter-web-app-cluster-role-binding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: jupyter-web-app-cluster-role -subjects: -- kind: ServiceAccount - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml deleted file mode 100644 index 3ebd804347..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_jupyter-web-app-jupyter-notebook-role.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - - secrets - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml deleted file mode 100644 index 536d695e7e..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_jupyter-web-app-jupyter-notebook-role-binding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-notebook-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: jupyter-web-app-jupyter-notebook-role -subjects: -- kind: ServiceAccount - name: jupyter-notebook diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml deleted file mode 100644 index c8c91f4417..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-jupyter-web-app-config.yaml +++ /dev/null @@ -1,202 +0,0 @@ -apiVersion: v1 -data: - spawner_ui_config.yaml: |- - # Configuration file for the Jupyter UI. - # - # Each Jupyter UI option is configured by two keys: 'value' and 'readOnly' - # - The 'value' key contains the default value - # - The 'readOnly' key determines if the option will be available to users - # - # If the 'readOnly' key is present and set to 'true', the respective option - # will be disabled for users and only set by the admin. Also when a - # Notebook is POSTED to the API if a necessary field is not present then - # the value from the config will be used. - # - # If the 'readOnly' key is missing (defaults to 'false'), the respective option - # will be available for users to edit. - # - # Note that some values can be templated. Such values are the names of the - # Volumes as well as their StorageClass - spawnerFormDefaults: - image: - # The container Image for the user's Jupyter Notebook - # If readonly, this value must be a member of the list below - value: gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - # The list of available standard container Images - options: - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-1.15.2-notebook-gpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-cpu:1.0.0 - - gcr.io/kubeflow-images-public/tensorflow-2.1.0-notebook-gpu:1.0.0 - # By default, custom container Images are allowed - # Uncomment the following line to only enable standard container Images - readOnly: false - cpu: - # CPU for user's Notebook - value: '0.5' - readOnly: false - memory: - # Memory for user's Notebook - value: 1.0Gi - readOnly: false - workspaceVolume: - # Workspace Volume to be attached to user's Notebook - # Each Workspace Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - value: - type: - # The Type of the Workspace Volume - # Supported values: 'New', 'Existing' - value: New - name: - # The Name of the Workspace Volume - # Note that this is a templated value. Special values: - # {notebook-name}: Replaced with the name of the Notebook. The frontend - # will replace this value as the user types the name - value: 'workspace-{notebook-name}' - size: - # The Size of the Workspace Volume (in Gi) - value: '10Gi' - mountPath: - # The Path that the Workspace Volume will be mounted - value: /home/jovyan - accessModes: - # The Access Mode of the Workspace Volume - # Supported values: 'ReadWriteOnce', 'ReadWriteMany', 'ReadOnlyMany' - value: ReadWriteOnce - class: - # The StrageClass the PVC will use if type is New. Special values are: - # {none}: default StorageClass - # {empty}: empty string "" - value: '{none}' - readOnly: false - dataVolumes: - # List of additional Data Volumes to be attached to the user's Notebook - value: [] - # Each Data Volume is declared with the following attributes: - # Type, Name, Size, MountPath and Access Mode - # - # For example, a list with 2 Data Volumes: - # value: - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-1' - # size: - # value: '10Gi' - # class: - # value: standard - # mountPath: - # value: /home/jovyan/vol-1 - # accessModes: - # value: ReadWriteOnce - # class: - # value: {none} - # - value: - # type: - # value: New - # name: - # value: '{notebook-name}-vol-2' - # size: - # value: '10Gi' - # mountPath: - # value: /home/jovyan/vol-2 - # accessModes: - # value: ReadWriteMany - # class: - # value: {none} - readOnly: false - gpus: - # Number of GPUs to be assigned to the Notebook Container - value: - # values: "none", "1", "2", "4", "8" - num: "none" - # Determines what the UI will show and send to the backend - vendors: - - limitsKey: "nvidia.com/gpu" - uiName: "NVIDIA" - - limitsKey: "amd.com/gpu" - uiName: "AMD" - # Values: "" or a `limits-key` from the vendors list - vendor: "" - readOnly: false - shm: - value: true - readOnly: false - configurations: - # List of labels to be selected, these are the labels from PodDefaults - # value: - # - add-gcp-secret - # - default-editor - value: [] - readOnly: false - affinityConfig: - # The default `configKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available affinity configs - options: - - configKey: "none" - displayName: "None" - affinity: {} - # # (DESC) Pod gets an exclusive "n1-standard-2" Node - # # (TIP) set PreferNoSchedule taint on this node-pool - # # (TIP) enable cluster-autoscaler on this node-pool - # # (TIP) dont let users request more CPU/MEMORY than the size of this node - # - configKey: "exclusive__n1-standard-2" - # displayName: "Exclusive: n1-standard-2" - # affinity: - # # (Require) Node having label: `node_pool=notebook-n1-standard-2` - # nodeAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # nodeSelectorTerms: - # - matchExpressions: - # - key: "node_pool" - # operator: "In" - # values: - # - "notebook-n1-standard-2" - # # (Require) Node WITHOUT existing Pod having label: `notebook-name` - # podAntiAffinity: - # requiredDuringSchedulingIgnoredDuringExecution: - # - labelSelector: - # matchExpressions: - # - key: "notebook-name" - # operator: "Exists" - # namespaces: [] - # topologyKey: "kubernetes.io/hostname" - readOnly: false - tolerationGroup: - # The default `groupKey` from the options list - # If readonly, the default value will be the only option - value: "none" - # The list of available tolerationGroup configs - options: - - groupKey: "none" - displayName: "None" - tolerations: [] - # - groupKey: "group_1" - # displayName: "Group 1: description" - # tolerations: - # - key: "key1" - # operator: "Equal" - # value: "value1" - # effect: "NoSchedule" - # - key: "key2" - # operator: "Equal" - # value: "value2" - # effect: "NoSchedule" - readOnly: false -kind: ConfigMap -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-jupyter-web-app-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml deleted file mode 100644 index d7eecd36ee..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_configmap_jupyter-web-app-parameters.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: v1 -data: - ROK_SECRET_NAME: secret-rok-{username} - UI: default - clusterDomain: cluster.local - policy: Always - prefix: jupyter - userid-header: X-Goog-Authenticated-User-Email - userid-prefix: 'accounts.google.com:' -kind: ConfigMap -metadata: - annotations: {} - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml deleted file mode 100644 index 7384a64cfe..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_service_jupyter-web-app-service.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - getambassador.io/config: |- - --- - apiVersion: ambassador/v0 - kind: Mapping - name: webapp_mapping - prefix: /jupyter/ - service: jupyter-web-app-service.kubeflow - add_request_headers: - x-forwarded-prefix: /jupyter - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - run: jupyter-web-app - name: jupyter-web-app-service - namespace: kubeflow -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 5000 - selector: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml b/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml deleted file mode 100644 index b9ac04ed1e..0000000000 --- a/tests/tests/legacy_kustomizations/jupyter-web-app/test_data/expected/~g_v1_serviceaccount_jupyter-web-app-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: jupyter-web-app - app.kubernetes.io/component: jupyter-web-app - app.kubernetes.io/instance: jupyter-web-app-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: jupyter-web-app - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: jupyter-web-app - name: jupyter-web-app-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/kustomize_test.go b/tests/tests/legacy_kustomizations/katib-controller/kustomize_test.go deleted file mode 100644 index 18e8be9135..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib_controller - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/katib-controller", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml deleted file mode 100644 index 7736b35d26..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/app.k8s.io_v1beta1_application_katib-controller.yaml +++ /dev/null @@ -1,74 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: Secret - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-controller.yaml deleted file mode 100644 index 5e4f7428b9..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-controller.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - spec: - containers: - - args: - - --webhook-port=8443 - - --trial-resources=Job.v1.batch - - --trial-resources=TFJob.v1.kubeflow.org - - --trial-resources=PyTorchJob.v1.kubeflow.org - - --trial-resources=MPIJob.v1.kubeflow.org - - --trial-resources=PipelineRun.v1beta1.tekton.dev - command: - - ./katib-controller - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-controller:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-controller - ports: - - containerPort: 8443 - name: webhook - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - volumeMounts: - - mountPath: /tmp/cert - name: cert - readOnly: true - serviceAccountName: katib-controller - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: katib-controller diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-db-manager.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-db-manager.yaml deleted file mode 100644 index 8ac90c6c32..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-db-manager.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: db-manager - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: db-manager - name: katib-db-manager - spec: - containers: - - command: - - ./katib-db-manager - env: - - name: DB_NAME - value: mysql - - name: DB_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - image: docker.io/kubeflowkatib/katib-db-manager:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - livenessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - failureThreshold: 5 - initialDelaySeconds: 10 - periodSeconds: 60 - name: katib-db-manager - ports: - - containerPort: 6789 - name: api - readinessProbe: - exec: - command: - - /bin/grpc_health_probe - - -addr=:6789 - initialDelaySeconds: 5 diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-mysql.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-mysql.yaml deleted file mode 100644 index 88fce38153..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-mysql.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: mysql - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: mysql - name: katib-mysql - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - env: - - name: MYSQL_ROOT_PASSWORD - valueFrom: - secretKeyRef: - key: MYSQL_ROOT_PASSWORD - name: katib-mysql-secrets - - name: MYSQL_ALLOW_EMPTY_PASSWORD - value: "true" - - name: MYSQL_DATABASE - value: katib - image: mysql:8 - livenessProbe: - exec: - command: - - /bin/bash - - -c - - mysqladmin ping -u root -p${MYSQL_ROOT_PASSWORD} - initialDelaySeconds: 30 - periodSeconds: 10 - timeoutSeconds: 5 - name: katib-mysql - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D ${MYSQL_DATABASE} -u root -p${MYSQL_ROOT_PASSWORD} -e 'SELECT - 1' - initialDelaySeconds: 5 - periodSeconds: 10 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: katib-mysql - volumes: - - name: katib-mysql - persistentVolumeClaim: - claimName: katib-mysql diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-ui.yaml deleted file mode 100644 index d5972b7767..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/apps_v1_deployment_katib-ui.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: ui - name: katib-ui - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: ui - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: ui - name: katib-ui - spec: - containers: - - args: - - --port=8080 - command: - - ./katib-ui - env: - - name: KATIB_CORE_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: docker.io/kubeflowkatib/katib-ui:v1beta1-a96ff59 - imagePullPolicy: IfNotPresent - name: katib-ui - ports: - - containerPort: 8080 - name: ui - serviceAccountName: katib-ui diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml deleted file mode 100644 index b542d8a2ea..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/networking.istio.io_v1alpha3_virtualservice_katib-ui.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /katib/ - rewrite: - uri: /katib/ - route: - - destination: - host: katib-ui.kubeflow.svc.cluster.local - port: - number: 80 diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml deleted file mode 100644 index 6793a30835..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-controller.yaml +++ /dev/null @@ -1,96 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller -rules: -- apiGroups: - - "" - resources: - - configmaps - - serviceaccounts - - services - - secrets - - events - - namespaces - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - pods/log - - pods/status - verbs: - - '*' -- apiGroups: - - apps - resources: - - deployments - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - - cronjobs - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get -- apiGroups: - - admissionregistration.k8s.io - resources: - - validatingwebhookconfigurations - - mutatingwebhookconfigurations - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - experiments/status - - experiments/finalizers - - trials - - trials/status - - trials/finalizers - - suggestions - - suggestions/status - - suggestions/finalizers - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - pytorchjobs - - mpijobs - verbs: - - '*' -- apiGroups: - - tekton.dev - resources: - - pipelineruns - - taskruns - verbs: - - '*' -- apiGroups: - - rbac.authorization.k8s.io - resources: - - roles - - rolebindings - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml deleted file mode 100644 index 253457958e..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_katib-ui.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-ui -rules: -- apiGroups: - - "" - resources: - - configmaps - - namespaces - verbs: - - '*' -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml deleted file mode 100644 index 3ae4741549..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-katib-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml deleted file mode 100644 index 8df3edf8d1..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-edit.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-katib-admin: "true" - name: kubeflow-katib-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml deleted file mode 100644 index 7a5af33244..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-katib-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-katib-view -rules: -- apiGroups: - - kubeflow.org - resources: - - experiments - - trials - - suggestions - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml deleted file mode 100644 index d6e826e984..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-controller.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-controller -subjects: -- kind: ServiceAccount - name: katib-controller - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml deleted file mode 100644 index 29b320c9c9..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_katib-ui.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-ui -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: katib-ui -subjects: -- kind: ServiceAccount - name: katib-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-config.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-config.yaml deleted file mode 100644 index d764d91d2c..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-config.yaml +++ /dev/null @@ -1,70 +0,0 @@ -apiVersion: v1 -data: - early-stopping: |- - { - "medianstop": { - "image": "docker.io/kubeflowkatib/earlystopping-medianstop:v1beta1-a96ff59", - "imagePullPolicy": "Always" - } - } - metrics-collector-sidecar: |- - { - "StdOut": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "File": { - "image": "docker.io/kubeflowkatib/file-metrics-collector:v1beta1-a96ff59" - }, - "TensorFlowEvent": { - "image": "docker.io/kubeflowkatib/tfevent-metrics-collector:v1beta1-a96ff59", - "resources": { - "limits": { - "memory": "1Gi" - } - } - } - } - suggestion: |- - { - "random": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "grid": { - "image": "docker.io/kubeflowkatib/suggestion-chocolate:v1beta1-a96ff59" - }, - "hyperband": { - "image": "docker.io/kubeflowkatib/suggestion-hyperband:v1beta1-a96ff59" - }, - "bayesianoptimization": { - "image": "docker.io/kubeflowkatib/suggestion-skopt:v1beta1-a96ff59" - }, - "tpe": { - "image": "docker.io/kubeflowkatib/suggestion-hyperopt:v1beta1-a96ff59" - }, - "enas": { - "image": "docker.io/kubeflowkatib/suggestion-enas:v1beta1-a96ff59", - "imagePullPolicy": "Always", - "resources": { - "limits": { - "memory": "200Mi" - } - } - }, - "cmaes": { - "image": "docker.io/kubeflowkatib/suggestion-goptuna:v1beta1-a96ff59" - }, - "darts": { - "image": "docker.io/kubeflowkatib/suggestion-darts:v1beta1-a96ff59" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-parameters.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-parameters.yaml deleted file mode 100644 index 78bc67eddd..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_katib-parameters.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - clusterDomain: cluster.local -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_trial-template.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_trial-template.yaml deleted file mode 100644 index 38c502dda2..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_configmap_trial-template.yaml +++ /dev/null @@ -1,81 +0,0 @@ -apiVersion: v1 -data: - defaultTrialTemplate.yaml: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/mxnet-mnist:v1beta1-a96ff59 - command: - - "python3" - - "/opt/mxnet-mnist/mnist.py" - - "--batch-size=64" - - "--lr=${trialParameters.learningRate}" - - "--num-layers=${trialParameters.numberLayers}" - - "--optimizer=${trialParameters.optimizer}" - restartPolicy: Never - enasCPUTemplate: |- - apiVersion: batch/v1 - kind: Job - spec: - template: - spec: - containers: - - name: training-container - image: docker.io/kubeflowkatib/enas-cnn-cifar10-cpu:v1beta1-a96ff59 - command: - - python3 - - -u - - RunTrial.py - - --num_epochs=1 - - "--architecture=\"${trialParameters.neuralNetworkArchitecture}\"" - - "--nn_config=\"${trialParameters.neuralNetworkConfig}\"" - restartPolicy: Never - pytorchJobTemplate: |- - apiVersion: "kubeflow.org/v1" - kind: PyTorchJob - spec: - pytorchReplicaSpecs: - Master: - replicas: 1 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" - Worker: - replicas: 2 - restartPolicy: OnFailure - template: - spec: - containers: - - name: pytorch - image: gcr.io/kubeflow-ci/pytorch-dist-mnist-test:v1.0 - imagePullPolicy: Always - command: - - "python" - - "/var/mnist.py" - - "--lr=${trialParameters.learningRate}" - - "--momentum=${trialParameters.momentum}" -kind: ConfigMap -metadata: - labels: - app: katib-trial-templates - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: trial-template - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml deleted file mode 100644 index 5a4afe25d9..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_persistentvolumeclaim_katib-mysql.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-controller.yaml deleted file mode 100644 index 814205b63d..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-controller.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml deleted file mode 100644 index 41757cb331..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_secret_katib-mysql-secrets.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - MYSQL_ROOT_PASSWORD: dGVzdA== -kind: Secret -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-mysql-secrets - namespace: kubeflow -type: Opaque diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-controller.yaml deleted file mode 100644 index 8a8e448a6c..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-controller.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8080" - prometheus.io/scheme: http - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller - namespace: kubeflow -spec: - ports: - - name: webhook - port: 443 - protocol: TCP - targetPort: 8443 - - name: metrics - port: 8080 - targetPort: 8080 - selector: - app: katib-controller - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-db-manager.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-db-manager.yaml deleted file mode 100644 index c000625b71..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-db-manager.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: db-manager - name: katib-db-manager - namespace: kubeflow -spec: - ports: - - name: api - port: 6789 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: db-manager - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-mysql.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-mysql.yaml deleted file mode 100644 index c4d7ef7515..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-mysql.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: mysql - name: katib-mysql - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: mysql - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-ui.yaml deleted file mode 100644 index 5a65af24fe..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_service_katib-ui.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: ui - name: katib-ui - namespace: kubeflow -spec: - ports: - - name: ui - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app: katib - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - component: ui - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml deleted file mode 100644 index 7fb4fc4886..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-controller.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-controller - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml b/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml deleted file mode 100644 index a9184e291c..0000000000 --- a/tests/tests/legacy_kustomizations/katib-controller/test_data/expected/~g_v1_serviceaccount_katib-ui.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-controller-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/katib-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/katib-crds/kustomize_test.go deleted file mode 100644 index cb5eb5a72b..0000000000 --- a/tests/tests/legacy_kustomizations/katib-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package katib_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/katib-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml deleted file mode 100644 index a41af8103d..0000000000 --- a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_experiments.kubeflow.org.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: experiments.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Experiment - plural: experiments - singular: experiment - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml deleted file mode 100644 index 408c4f53bd..0000000000 --- a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_suggestions.kubeflow.org.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: suggestions.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .spec.requests - name: Requested - type: string - - JSONPath: .status.suggestionCount - name: Assigned - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Suggestion - plural: suggestions - singular: suggestion - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml deleted file mode 100644 index 0af7a654db..0000000000 --- a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_trials.kubeflow.org.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: trials.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: Type - type: string - - JSONPath: .status.conditions[-1:].status - name: Status - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - categories: - - all - - kubeflow - - katib - kind: Trial - plural: trials - singular: trial - scope: Namespaced - subresources: - status: {} - version: v1beta1 diff --git a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml b/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml deleted file mode 100644 index 8f6b7edd54..0000000000 --- a/tests/tests/legacy_kustomizations/katib-crds/test_data/expected/app.k8s.io_v1beta1_application_katib-crds.yaml +++ /dev/null @@ -1,72 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds-0.8.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.8.0 - name: katib-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: Experiment - - group: kubeflow.org - kind: Suggestion - - group: kubeflow.org - kind: Trial - descriptor: - description: Katib is a service for hyperparameter tuning and neural architecture - search. - keywords: - - katib - - katib-controller - - hyperparameter tuning - links: - - description: About - url: https://github.com/kubeflow/katib - maintainers: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - owners: - - email: gaoce@caicloud.io - name: Ce Gao - - email: johnugeo@cisco.com - name: Johnu George - - email: liuhougang6@126.com - name: Hougang Liu - - email: ricliu@google.com - name: Richard Liu - - email: yuji.oshima0x3fd@gmail.com - name: YujiOshima - - email: andrey.velichkevich@gmail.com - name: Andrey Velichkevich - type: katib - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: katib - app.kubernetes.io/instance: katib-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: katib-crds - app.kubernetes.io/part-of: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/kfserving-crds/kustomize_test.go deleted file mode 100644 index 2615415794..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfserving_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/kfserving-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml deleted file mode 100644 index b873fe38ee..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inferenceservices.serving.kubeflow.org.yaml +++ /dev/null @@ -1,6668 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - controller-gen.kubebuilder.io/version: (unknown) - creationTimestamp: null - labels: - app.kubernetes.io/component: kfserving-crds - app.kubernetes.io/instance: kfserving-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - name: inferenceservices.serving.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.traffic - name: Default Traffic - type: integer - - JSONPath: .status.canaryTraffic - name: Canary Traffic - type: integer - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: serving.kubeflow.org - names: - kind: InferenceService - listKind: InferenceServiceList - plural: inferenceservices - shortNames: - - inferenceservice - singular: inferenceservice - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - description: InferenceService is the Schema for the services API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: InferenceServiceSpec defines the desired state of InferenceService - properties: - canary: - description: Canary defines an alternate endpoints to route a percentage - of traffic. - properties: - explainer: - description: Explainer defines the model explanation service spec, - explainer service calls to predictor or transformer if it is specified. - properties: - alibi: - description: Spec for alibi explainer - properties: - config: - additionalProperties: - type: string - description: Inline custom parameter settings for explainer - type: object - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Defaults to latest Alibi Version - type: string - storageUri: - description: The location of a trained explanation model - type: string - type: - description: The type of Alibi explainer - type: string - required: - - type - type: object - custom: - description: Spec for a custom explainer - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - type: object - predictor: - description: Predictor defines the model serving spec - properties: - custom: - description: Spec for a custom predictor - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - onnx: - description: Spec for ONNX runtime (https://github.com/microsoft/onnxruntime) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - pytorch: - description: Spec for PyTorch predictor - properties: - modelClassName: - description: Defaults PyTorch model class name to 'PyTorchModel' - type: string - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - sklearn: - description: Spec for SKLearn predictor - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - tensorflow: - description: Spec for Tensorflow Serving (https://github.com/tensorflow/serving) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map. - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - tensorrt: - description: Spec for TensorRT Inference Server (https://github.com/NVIDIA/tensorrt-inference-server) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - xgboost: - description: Spec for XGBoost predictor - properties: - nthread: - description: Number of thread to be used by XGBoost - type: integer - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - type: object - transformer: - description: Transformer defines the pre/post processing before - and after the predictor call, transformer service calls to predictor - service. - properties: - custom: - description: Spec for a custom transformer - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - type: object - required: - - predictor - type: object - canaryTrafficPercent: - description: CanaryTrafficPercent defines the percentage of traffic - going to canary InferenceService endpoints - type: integer - default: - description: Default defines default InferenceService endpoints - properties: - explainer: - description: Explainer defines the model explanation service spec, - explainer service calls to predictor or transformer if it is specified. - properties: - alibi: - description: Spec for alibi explainer - properties: - config: - additionalProperties: - type: string - description: Inline custom parameter settings for explainer - type: object - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Defaults to latest Alibi Version - type: string - storageUri: - description: The location of a trained explanation model - type: string - type: - description: The type of Alibi explainer - type: string - required: - - type - type: object - custom: - description: Spec for a custom explainer - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - type: object - predictor: - description: Predictor defines the model serving spec - properties: - custom: - description: Spec for a custom predictor - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - onnx: - description: Spec for ONNX runtime (https://github.com/microsoft/onnxruntime) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - pytorch: - description: Spec for PyTorch predictor - properties: - modelClassName: - description: Defaults PyTorch model class name to 'PyTorchModel' - type: string - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - sklearn: - description: Spec for SKLearn predictor - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - tensorflow: - description: Spec for Tensorflow Serving (https://github.com/tensorflow/serving) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map. - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - tensorrt: - description: Spec for TensorRT Inference Server (https://github.com/NVIDIA/tensorrt-inference-server) - properties: - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - xgboost: - description: Spec for XGBoost predictor - properties: - nthread: - description: Number of thread to be used by XGBoost - type: integer - resources: - description: Defaults to requests and limits of 1CPU, 2Gb - MEM. - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount of - compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - runtimeVersion: - description: Allowed runtime versions are specified in the - inferenceservice config map - type: string - storageUri: - description: The location of the trained model - type: string - required: - - storageUri - type: object - type: object - transformer: - description: Transformer defines the pre/post processing before - and after the predictor call, transformer service calls to predictor - service. - properties: - custom: - description: Spec for a custom transformer - properties: - container: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the - reference in the input string will be unchanged. The - $(VAR_NAME) syntax can be escaped with a double $$, - ie: $$(VAR_NAME). Escaped references will never be - expanded, regardless of whether the variable exists - or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used if - this is not provided. Variable references $(VAR_NAME) - are expanded using the container''s environment. If - a variable cannot be resolved, the reference in the - input string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in - the container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: - supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, spec.nodeName, - spec.serviceAccountName, status.hostIP, - status.podIP.' - properties: - apiVersion: - description: Version of the schema the - FieldPath is written in terms of, defaults - to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, - requests.cpu, requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env vars' - type: string - divisor: - description: Specifies the output format - of the exposed resources, defaults to - "1" - type: string - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in - the pod's namespace - properties: - key: - description: The key of the secret to - select from. Must be a valid secret - key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined within - a source must be a C_IDENTIFIER. All invalid keys - will be reported as an event when the container is - starting. When a key exists in multiple sources, the - value associated with the last source will take precedence. - Values defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images - in workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :v0.3.0 tag is - specified, or IfNotPresent otherwise. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, - the container is terminated and restarted according - to its restart policy. Other management of the - container blocks until the hook completes. More - info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness probe failure, - preemption, resource contention, etc. The handler - is not called if the container crashes or exits. - The reason for termination is passed to the handler. - The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. - Regardless of the outcome of the handler, the - container will eventually terminate within the - Pod''s termination grace period. Other management - of the container blocks until the hook completes - or until the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line - to execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside - a shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, - you need to explicitly call out to that - shell. Exit status of 0 is treated as - live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet supported - TODO: implement a realistic TCP lifecycle - hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. Cannot - be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port - here DOES NOT prevent that port from being exposed. - Any port which is listening on the default "0.0.0.0" - address inside a container will be accessible from - the network. Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, - this must match ContainerPort. Most containers - do not need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the - port that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') in - the container's filesystem. The command is - simply exec'd, it is not run inside a shell, - so traditional shell instructions ('|', etc) - won't work. To use a shell, you need to explicitly - call out to that shell. Exit status of 0 is - treated as live/healthy and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: string - - type: integer - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - scheme: - description: Scheme to use for connecting to - the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is - 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having - failed. Defaults to 1. Must be 1 for liveness. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: string - - type: integer - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the - probe times out. Defaults to 1 second. Minimum - value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - type: string - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - type: string - description: 'Requests describes the minimum amount - of compute resources required. If Requests is - omitted for a container, it defaults to Limits - if that is explicitly specified, otherwise to - an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges than - its parent process. This bool directly controls - if the no_new_privs flag will be set on the container - process. AllowPrivilegeEscalation is true always - when the container is: 1) run as Privileged 2) - has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc - mount to use for the containers. The default is - DefaultProcMount which uses the container runtime - defaults for readonly paths and masked paths. - This requires the ProcMountType feature flag to - be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: Windows security options. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - This field is alpha-level and is only honored - by servers that enable the WindowsGMSA feature - flag. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. This field - is alpha-level and is only honored by servers - that enable the WindowsGMSA feature flag. - type: string - type: object - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. If this - is not set, reads from stdin in the container will - always result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce - is set to true, stdin is opened on container start, - is empty until the first client attaches to stdin, - and then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such - as an assertion failure message. Will be truncated - by the node if greater than 4096 bytes. The total - message length across all containers will be limited - to 12kb. Defaults to /dev/termination-log. Cannot - be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be - updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be true. - Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. This is a beta feature. - items: - description: volumeDevice describes a mapping of a - raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside of - the container that the device will be mapped - to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a - Volume within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which - the container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment - variable references $(VAR_NAME) are expanded - using the container's environment. Defaults - to "" (volume's root). SubPathExpr and SubPath - are mutually exclusive. This field is beta in - 1.15. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot - be updated. - type: string - required: - - name - type: object - required: - - container - type: object - logger: - description: Activate request/response logging - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - maxReplicas: - description: This is the up bound for autoscaler to scale to - type: integer - minReplicas: - description: Minimum number of replicas, pods won't scale down - to 0 in case of no traffic - type: integer - parallelism: - description: Parallelism specifies how many requests can be - processed concurrently, this sets the target concurrency for - Autoscaling(KPA). For model servers that support tuning parallelism - will use this value, by default the parallelism is the number - of the CPU cores for most of the model servers. - type: integer - serviceAccountName: - description: ServiceAccountName is the name of the ServiceAccount - to use to run the service - type: string - type: object - required: - - predictor - type: object - required: - - default - type: object - status: - description: InferenceServiceStatus defines the observed state of InferenceService - properties: - address: - description: Ducktype for addressable - properties: - url: - description: URL is an alias of url.URL. It has custom json marshal - methods that enable it to be used in K8s CRDs such that the CRD - resource will have the URL but operator code can can work with - url.URL struct - type: string - canary: - additionalProperties: - description: StatusConfigurationSpec describes the state of the configuration - receiving traffic. - properties: - host: - description: Host name of the service - type: string - name: - description: Latest revision name that is in ready state - type: string - replicas: - type: integer - type: object - description: Statuses for the canary endpoints of the InferenceService - type: object - canaryTraffic: - description: Traffic percentage that goes to canary services - type: integer - conditions: - description: Conditions the latest available observations of a resource's - current state. +patchMergeKey=type +patchStrategy=merge - items: - properties: - lastTransitionTime: - description: LastTransitionTime is the last time the condition - transitioned from one status to another. We use VolatileTime - in place of metav1.Time to exclude this from creating equality.Semantic - differences (all other things held constant). - type: string - message: - description: A human readable message indicating details about - the transition. - type: string - reason: - description: The reason for the condition's last transition. - type: string - severity: - description: Severity with which to treat failures of this type - of condition. When this is not specified, it defaults to Error. - type: string - status: - description: Status of the condition, one of True, False, Unknown. - +required - type: string - type: - description: Type of condition. +required - type: string - required: - - type - - status - type: object - type: array - default: - additionalProperties: - description: StatusConfigurationSpec describes the state of the configuration - receiving traffic. - properties: - host: - description: Host name of the service - type: string - name: - description: Latest revision name that is in ready state - type: string - replicas: - type: integer - type: object - description: Statuses for the default endpoints of the InferenceService - type: object - observedGeneration: - description: ObservedGeneration is the 'Generation' of the Service that - was last processed by the controller. - format: int64 - type: integer - traffic: - description: Traffic percentage that goes to default services - type: integer - url: - description: URL of the InferenceService - type: string - type: object - type: object - version: v1alpha2 - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/app.k8s.io_v1beta1_application_kfserving-crds.yaml b/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/app.k8s.io_v1beta1_application_kfserving-crds.yaml deleted file mode 100644 index 3ef211fae2..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-crds/test_data/expected/app.k8s.io_v1beta1_application_kfserving-crds.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: kfserving-crds - app.kubernetes.io/instance: kfserving-crds - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - name: kfserving-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - kfserving-crds - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: kfserving-crds - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: kfserving-crds - app.kubernetes.io/instance: kfserving-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/kfserving-install/kustomize_test.go b/tests/tests/legacy_kustomizations/kfserving-install/kustomize_test.go deleted file mode 100644 index f86acbad6c..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kfserving_install - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/kfserving-install", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index 5c0b7f9c04..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.defaulter - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /mutate-pods - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.pod-mutator - namespaceSelector: - matchExpressions: - - key: control-plane - operator: DoesNotExist - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - pods diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml deleted file mode 100644 index 9de6386a15..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_inferenceservice.serving.kubeflow.org.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/serving-cert - creationTimestamp: null - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: inferenceservice.serving.kubeflow.org -webhooks: -- clientConfig: - caBundle: Cg== - service: - name: kfserving-webhook-server-service - namespace: kubeflow - path: /validate-inferenceservices - failurePolicy: Fail - name: inferenceservice.kfserving-webhook-server.validator - rules: - - apiGroups: - - serving.kubeflow.org - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - inferenceservices diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml deleted file mode 100644 index de80b6d947..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/app.k8s.io_v1beta1_application_kfserving.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - name: kfserving - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: KFServing provides a Kubernetes Custom Resource Definition for serving - ML Models on arbitrary frameworks - keywords: - - kfserving - - inference - links: - - description: About - url: https://github.com/kubeflow/kfserving - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: kfserving - version: v1alpha2 - selector: - matchLabels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml deleted file mode 100644 index 24401ba223..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/apps_v1_statefulset_kfserving-controller-manager.yaml +++ /dev/null @@ -1,91 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager - namespace: kubeflow -spec: - selector: - matchLabels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - serviceName: controller-manager-service - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - spec: - containers: - - args: - - --secure-listen-address=0.0.0.0:8443 - - --upstream=http://127.0.0.1:8080/ - - --logtostderr=true - - --v=10 - image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 - name: kube-rbac-proxy - ports: - - containerPort: 8443 - name: https - - args: - - --metrics-addr=127.0.0.1:8080 - command: - - /manager - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: SECRET_NAME - value: kfserving-webhook-server-cert - - name: ENABLE_WEBHOOK_NAMESPACE_SELECTOR - value: enabled - image: gcr.io/kfserving/kfserving-controller:v0.3.0 - imagePullPolicy: Always - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - resources: - limits: - cpu: 100m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: kfserving-webhook-server-cert diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml deleted file mode 100644 index 441a673ade..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_certificate_serving-cert.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: serving-cert - namespace: kubeflow -spec: - commonName: kfserving-webhook-server-service.kubeflow.svc - dnsNames: - - kfserving-webhook-server-service.kubeflow.svc - issuerRef: - kind: Issuer - name: selfsigned-issuer - secretName: kfserving-webhook-server-cert diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml deleted file mode 100644 index c7ab6cc51b..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/cert-manager.io_v1alpha2_issuer_selfsigned-issuer.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml deleted file mode 100644 index 5d4c91bde8..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kfserving-proxy-role.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: kfserving-proxy-role -rules: -- apiGroups: - - authentication.k8s.io - resources: - - tokenreviews - verbs: - - create -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml deleted file mode 100644 index f57a3f0de1..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-admin.yaml +++ /dev/null @@ -1,18 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kfserving-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml deleted file mode 100644 index 4a12f4a925..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-edit.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-kfserving-admin: "true" - name: kubeflow-kfserving-edit -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml deleted file mode 100644 index 9378aceba7..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kfserving-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kfserving-view -rules: -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_manager-role.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_manager-role.yaml deleted file mode 100644 index 633ca398c8..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_manager-role.yaml +++ /dev/null @@ -1,143 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: manager-role -rules: -- apiGroups: - - serving.knative.dev - resources: - - services - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - serving.knative.dev - resources: - - services/status - verbs: - - get - - update - - patch -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - update - - patch -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - serving.kubeflow.org - resources: - - inferenceservices/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - services - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml deleted file mode 100644 index 5ec6da22b3..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_kfserving-proxy-rolebinding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: kfserving-proxy-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kfserving-proxy-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_manager-rolebinding.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_manager-rolebinding.yaml deleted file mode 100644 index 53bd731b48..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_manager-rolebinding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: manager-rolebinding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: manager-role -subjects: -- kind: ServiceAccount - name: default - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml deleted file mode 100644 index a5b53dd438..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_inferenceservice-config.yaml +++ /dev/null @@ -1,113 +0,0 @@ -apiVersion: v1 -data: - credentials: |- - { - "gcs": { - "gcsCredentialFileName": "gcloud-application-credentials.json" - }, - "s3": { - "s3AccessKeyIDName": "awsAccessKeyID", - "s3SecretAccessKeyName": "awsSecretAccessKey" - } - } - explainers: |- - { - "alibi": { - "image" : "docker.io/seldonio/kfserving-alibiexplainer", - "defaultImageVersion": "v0.3.0", - "allowedImageVersions": [ - "v0.3.0" - ] - } - } - ingress: |- - { - "ingressGateway" : "kubeflow-gateway.kubeflow", - "ingressService" : "istio-ingressgateway.istio-system.svc.cluster.local" - } - logger: |- - { - "image" : "gcr.io/kfserving/logger:v0.3.0", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1" - } - predictors: |- - { - "tensorflow": { - "image": "tensorflow/serving", - "defaultImageVersion": "1.14.0", - "defaultGpuImageVersion": "1.14.0-gpu", - "allowedImageVersions": [ - "1.11.0", - "1.11.0-gpu", - "1.12.0", - "1.12.0-gpu", - "1.13.0", - "1.13.0-gpu", - "1.14.0", - "1.14.0-gpu" - ] - }, - "onnx": { - "image": "mcr.microsoft.com/onnxruntime/server", - "defaultImageVersion": "v0.5.1", - "allowedImageVersions": [ - "v0.5.1" - ] - }, - "sklearn": { - "image": "gcr.io/kfserving/sklearnserver", - "defaultImageVersion": "v0.3.0", - "allowedImageVersions": [ - "v0.3.0" - ] - }, - "xgboost": { - "image": "gcr.io/kfserving/xgbserver", - "defaultImageVersion": "v0.3.0", - "allowedImageVersions": [ - "v0.3.0" - ] - }, - "pytorch": { - "image": "gcr.io/kfserving/pytorchserver", - "defaultImageVersion": "v0.3.0", - "defaultGpuImageVersion": "v0.3.0-gpu", - "allowedImageVersions": [ - "v0.3.0", - "v0.3.0-gpu" - ] - }, - "tensorrt": { - "image": "nvcr.io/nvidia/tensorrtserver", - "defaultImageVersion": "19.05-py3", - "allowedImageVersions": [ - "19.05-py3" - ] - } - } - storageInitializer: |- - { - "image" : "gcr.io/kfserving/storage-initializer:v0.3.0", - "memoryRequest": "100Mi", - "memoryLimit": "1Gi", - "cpuRequest": "100m", - "cpuLimit": "1" - } - transformers: |- - { - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: inferenceservice-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_kfserving-config.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_kfserving-config.yaml deleted file mode 100644 index 33cb6bb1bb..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_configmap_kfserving-config.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -data: - registry: gcr.io/kfserving -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: kfserving-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml deleted file mode 100644 index d92d1f741f..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_secret_kfserving-webhook-server-secret.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: kfserving-webhook-server-secret - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml deleted file mode 100644 index 9ad1e63b4d..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-metrics-service.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/port: "8443" - prometheus.io/scheme: https - prometheus.io/scrape: "true" - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-metrics-service - namespace: kubeflow -spec: - ports: - - name: https - port: 8443 - targetPort: https - selector: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml deleted file mode 100644 index 6fc02be24b..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-controller-manager-service.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving - name: kfserving-controller-manager-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - controller-tools.k8s.io: "1.0" - kustomize.component: kfserving diff --git a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml b/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml deleted file mode 100644 index 021ed91d48..0000000000 --- a/tests/tests/legacy_kustomizations/kfserving-install/test_data/expected/~g_v1_service_kfserving-webhook-server-service.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - kustomize.component: kfserving - name: kfserving-webhook-server-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app.kubernetes.io/component: kfserving-install - app.kubernetes.io/instance: kfserving-install - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: kfserving-install - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.3.0 - control-plane: kfserving-controller-manager - kustomize.component: kfserving diff --git a/tests/tests/legacy_kustomizations/knative-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/knative-crds/kustomize_test.go deleted file mode 100644 index 7b70fceed1..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package knative_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/knative-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml deleted file mode 100644 index a4a9e13799..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_certificates.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: certificates.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: Certificate - plural: certificates - shortNames: - - kcert - singular: certificate - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml deleted file mode 100644 index c2e838313a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configurations.serving.knative.dev.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - duck.knative.dev/podspecable: "true" - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: configurations.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.latestCreatedRevisionName - name: LatestCreated - type: string - - JSONPath: .status.latestReadyRevisionName - name: LatestReady - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Configuration - plural: configurations - shortNames: - - config - - cfg - singular: configuration - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml deleted file mode 100644 index 7bfd9cca28..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_images.caching.internal.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - name: images.caching.internal.knative.dev -spec: - group: caching.internal.knative.dev - names: - categories: - - knative-internal - - caching - kind: Image - plural: images - shortNames: - - img - singular: image - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml deleted file mode 100644 index affe99a6ce..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_ingresses.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: ingresses.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: Ingress - plural: ingresses - shortNames: - - kingress - - king - singular: ingress - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml deleted file mode 100644 index 3bcb94363d..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_metrics.autoscaling.internal.knative.dev.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: metrics.autoscaling.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: autoscaling.internal.knative.dev - names: - categories: - - knative-internal - - autoscaling - kind: Metric - plural: metrics - singular: metric - scope: Namespaced - subresources: - status: {} - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml deleted file mode 100644 index f53b9d9afa..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_podautoscalers.autoscaling.internal.knative.dev.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: podautoscalers.autoscaling.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.desiredScale - name: DesiredScale - type: integer - - JSONPath: .status.actualScale - name: ActualScale - type: integer - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: autoscaling.internal.knative.dev - names: - categories: - - knative-internal - - autoscaling - kind: PodAutoscaler - plural: podautoscalers - shortNames: - - kpa - - pa - singular: podautoscaler - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml deleted file mode 100644 index edb13b8b1a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_revisions.serving.knative.dev.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: revisions.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .metadata.labels['serving\.knative\.dev/configuration'] - name: Config Name - type: string - - JSONPath: .status.serviceName - name: K8s Service Name - type: string - - JSONPath: .metadata.labels['serving\.knative\.dev/configurationGeneration'] - name: Generation - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Revision - plural: revisions - shortNames: - - rev - singular: revision - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml deleted file mode 100644 index 3b0bf3cc7c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_routes.serving.knative.dev.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - duck.knative.dev/addressable: "true" - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: routes.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Route - plural: routes - shortNames: - - rt - singular: route - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml deleted file mode 100644 index 9c6672f590..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_serverlessservices.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: serverlessservices.networking.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .spec.mode - name: Mode - type: string - - JSONPath: .spec.numActivators - name: Activators - type: integer - - JSONPath: .status.serviceName - name: ServiceName - type: string - - JSONPath: .status.privateServiceName - name: PrivateServiceName - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - group: networking.internal.knative.dev - names: - categories: - - knative-internal - - networking - kind: ServerlessService - plural: serverlessservices - shortNames: - - sks - singular: serverlessservice - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml deleted file mode 100644 index 6b01453a9c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_services.serving.knative.dev.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - duck.knative.dev/addressable: "true" - duck.knative.dev/podspecable: "true" - knative.dev/crd-install: "true" - serving.knative.dev/release: v0.14.3 - name: services.serving.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.url - name: URL - type: string - - JSONPath: .status.latestCreatedRevisionName - name: LatestCreated - type: string - - JSONPath: .status.latestReadyRevisionName - name: LatestReady - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: webhook - namespace: knative-serving - group: serving.knative.dev - names: - categories: - - all - - knative - - serving - kind: Service - plural: services - shortNames: - - kservice - - ksvc - singular: service - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: false - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml deleted file mode 100644 index c54f285c7f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-crds.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - name: knative-serving-crds - namespace: knative-serving -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-serving-crds - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-serving-crds - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds diff --git a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/~g_v1_namespace_knative-serving.yaml b/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/~g_v1_namespace_knative-serving.yaml deleted file mode 100644 index f264646b76..0000000000 --- a/tests/tests/legacy_kustomizations/knative-crds/test_data/expected/~g_v1_namespace_knative-serving.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/component: knative-serving-crds - app.kubernetes.io/name: knative-serving-crds - serving.knative.dev/release: v0.14.3 - name: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/knative-eventing-crds/kustomize_test.go deleted file mode 100644 index 8216a604fe..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package knative_eventing_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/knative-eventing-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apiserversources.sources.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apiserversources.sources.knative.dev.yaml deleted file mode 100644 index 7eabb9deeb..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_apiserversources.sources.knative.dev.yaml +++ /dev/null @@ -1,66 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - registry.knative.dev/eventTypes: | - [ - { "type": "dev.knative.apiserver.resource.add" }, - { "type": "dev.knative.apiserver.resource.delete" }, - { "type": "dev.knative.apiserver.resource.update" }, - { "type": "dev.knative.apiserver.ref.add" }, - { "type": "dev.knative.apiserver.ref.delete" }, - { "type": "dev.knative.apiserver.ref.update" } - ] - creationTimestamp: null - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/source: "true" - eventing.knative.dev/release: v0.14.2 - eventing.knative.dev/source: "true" - knative.dev/crd-install: "true" - name: apiserversources.sources.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - - JSONPath: .status.sinkUri - name: Sink - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: sources.knative.dev - names: - categories: - - all - - knative - - eventing - - sources - kind: ApiServerSource - plural: apiserversources - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_brokers.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_brokers.eventing.knative.dev.yaml deleted file mode 100644 index 705f31185b..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_brokers.eventing.knative.dev.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: brokers.eventing.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .status.address.url - name: URL - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: eventing.knative.dev - names: - categories: - - all - - knative - - eventing - kind: Broker - plural: brokers - singular: broker - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_channels.messaging.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_channels.messaging.knative.dev.yaml deleted file mode 100644 index b862eec66f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_channels.messaging.knative.dev.yaml +++ /dev/null @@ -1,142 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - messaging.knative.dev/subscribable: "true" - name: channels.messaging.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .status.address.url - name: URL - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: messaging.knative.dev - names: - categories: - - all - - knative - - messaging - - channel - kind: Channel - plural: channels - shortNames: - - ch - singular: channel - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - channelTemplate: - description: 'Channel implementation which dictates the durability - guarantees of events. If not specified then the default channel - is used. More information: https://knative.dev/docs/eventing/channels/default-channels.' - properties: - apiVersion: - description: API version of the channel implementation. - minLength: 1 - type: string - kind: - description: Kind of the channel implementation to use (InMemoryChannel, - KafkaChannel, etc.). - minLength: 1 - type: string - spec: - type: object - required: - - apiVersion - - kind - type: object - subscribable: - properties: - subscribers: - description: Events received on the channel are forwarded to its - subscribers. - items: - properties: - ref: - description: a reference to a Kubernetes object from which - to retrieve the target URI. - properties: - apiVersion: - type: string - kind: - type: string - name: - minLength: 1 - type: string - namespace: - minLength: 1 - type: string - uid: - minLength: 1 - type: string - required: - - namespace - - name - - uid - type: object - x-kubernetes-preserve-unknown-fields: true - replyURI: - description: Endpoint for the reply. - minLength: 1 - type: string - subscriberURI: - description: Endpoint for the subscriber. - minLength: 1 - type: string - uid: - description: Used to understand the origin of the subscriber. - minLength: 1 - type: string - required: - - uid - type: object - x-kubernetes-preserve-unknown-fields: true - type: array - type: object - type: object - status: - type: object - x-kubernetes-preserve-unknown-fields: true - type: object - served: true - storage: true - - name: v1beta1 - schema: - openAPIV3Schema: - properties: - spec: - type: object - x-kubernetes-preserve-unknown-fields: true - status: - type: object - x-kubernetes-preserve-unknown-fields: true - type: object - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configmappropagations.configs.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configmappropagations.configs.internal.knative.dev.yaml deleted file mode 100644 index fc8ccb3353..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_configmappropagations.configs.internal.knative.dev.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: configmappropagations.configs.internal.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .spec.originalNamespace - name: OriginalNamespace - type: string - group: configs.internal.knative.dev - names: - categories: - - knative-internal - kind: ConfigMapPropagation - plural: configmappropagations - shortNames: - - kcmp - - cmp - singular: configmappropagation - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - originalNamespace: - description: The namespace where original ConfigMaps exist in. - type: string - required: - - originalNamespace - versions: - - name: v1alpha1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_containersources.sources.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_containersources.sources.knative.dev.yaml deleted file mode 100644 index dc66e31849..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_containersources.sources.knative.dev.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/source: "true" - eventing.knative.dev/release: v0.14.2 - eventing.knative.dev/source: "true" - knative.dev/crd-install: "true" - name: containersources.sources.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - - JSONPath: .status.sinkUri - name: Sink - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: sources.knative.dev - names: - categories: - - all - - knative - - eventing - - sources - kind: ContainerSource - plural: containersources - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_eventtypes.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_eventtypes.eventing.knative.dev.yaml deleted file mode 100644 index 5027ae75d0..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_eventtypes.eventing.knative.dev.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: eventtypes.eventing.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .spec.type - name: Type - type: string - - JSONPath: .spec.source - name: Source - type: string - - JSONPath: .spec.schema - name: Schema - type: string - - JSONPath: .spec.broker - name: Broker - type: string - - JSONPath: .spec.description - name: Description - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: eventing.knative.dev - names: - categories: - - all - - knative - - eventing - kind: EventType - plural: eventtypes - singular: eventtype - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inmemorychannels.messaging.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inmemorychannels.messaging.knative.dev.yaml deleted file mode 100644 index 668c87f506..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_inmemorychannels.messaging.knative.dev.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - messaging.knative.dev/subscribable: "true" - name: inmemorychannels.messaging.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .status.address.url - name: URL - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: messaging.knative.dev - names: - categories: - - all - - knative - - messaging - - channel - kind: InMemoryChannel - plural: inmemorychannels - shortNames: - - imc - singular: inmemorychannel - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_parallels.flows.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_parallels.flows.knative.dev.yaml deleted file mode 100644 index fe8c45e163..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_parallels.flows.knative.dev.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: parallels.flows.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .status.address.url - name: URL - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: flows.knative.dev - names: - categories: - - all - - knative - - eventing - - flows - kind: Parallel - plural: parallels - singular: parallel - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pingsources.sources.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pingsources.sources.knative.dev.yaml deleted file mode 100644 index 1ad2338325..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pingsources.sources.knative.dev.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - registry.knative.dev/eventTypes: | - [ - { "type": "dev.knative.sources.ping" } - ] - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/source: "true" - eventing.knative.dev/release: v0.14.2 - eventing.knative.dev/source: "true" - knative.dev/crd-install: "true" - name: pingsources.sources.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - - JSONPath: .status.sinkUri - name: Sink - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: sources.knative.dev - names: - categories: - - all - - knative - - eventing - - sources - kind: PingSource - plural: pingsources - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sequences.flows.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sequences.flows.knative.dev.yaml deleted file mode 100644 index e866a7af92..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sequences.flows.knative.dev.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: sequences.flows.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .status.address.url - name: URL - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: flows.knative.dev - names: - categories: - - all - - knative - - eventing - - flows - kind: Sequence - plural: sequences - singular: sequence - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sinkbindings.sources.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sinkbindings.sources.knative.dev.yaml deleted file mode 100644 index 24379874fb..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sinkbindings.sources.knative.dev.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - duck.knative.dev/binding: "true" - duck.knative.dev/source: "true" - eventing.knative.dev/release: v0.14.2 - eventing.knative.dev/source: "true" - knative.dev/crd-install: "true" - name: sinkbindings.sources.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=='Ready')].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=='Ready')].reason - name: Reason - type: string - - JSONPath: .status.sinkUri - name: Sink - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: sources.knative.dev - names: - categories: - - all - - knative - - eventing - - sources - - bindings - kind: SinkBinding - plural: sinkbindings - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - type: object - x-kubernetes-preserve-unknown-fields: true - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_subscriptions.messaging.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_subscriptions.messaging.knative.dev.yaml deleted file mode 100644 index 12b55e2537..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_subscriptions.messaging.knative.dev.yaml +++ /dev/null @@ -1,136 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: subscriptions.messaging.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: None - group: messaging.knative.dev - names: - categories: - - all - - knative - - eventing - kind: Subscription - plural: subscriptions - shortNames: - - sub - singular: subscription - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - channel: - description: Channel that forwards incoming events to the subscription. - properties: - apiVersion: - minLength: 1 - type: string - kind: - type: string - name: - minLength: 1 - type: string - required: - - apiVersion - - kind - - name - type: object - delivery: - description: 'Subscription delivery options. More information: https://knative.dev/docs/eventing/event-delivery.' - type: object - x-kubernetes-preserve-unknown-fields: true - reply: - description: the destination that (optionally) receive events. - properties: - ref: - description: a reference to a Kubernetes object from which to retrieve - the target URI. - properties: - apiVersion: - minLength: 1 - type: string - kind: - minLength: 1 - type: string - name: - minLength: 1 - type: string - namespace: - minLength: 1 - type: string - required: - - apiVersion - - kind - - name - type: object - uri: - description: the target URI or, if ref is provided, a relative URI - reference that will be combined with ref to produce a target URI. - minLength: 1 - type: string - type: object - subscriber: - description: the subscriber that (optionally) processes events. - properties: - ref: - description: a reference to a Kubernetes object from which to retrieve - the target URI. - properties: - apiVersion: - minLength: 1 - type: string - kind: - minLength: 1 - type: string - name: - minLength: 1 - type: string - namespace: - minLength: 1 - type: string - required: - - apiVersion - - kind - - name - type: object - uri: - description: the target URI or, if ref is provided, a relative URI - reference that will be combined with ref to produce a target URI. - minLength: 1 - type: string - type: object - required: - - channel - type: object - status: - type: object - x-kubernetes-preserve-unknown-fields: true - type: object - versions: - - name: v1alpha1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_triggers.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_triggers.eventing.knative.dev.yaml deleted file mode 100644 index 13f2309443..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_triggers.eventing.knative.dev.yaml +++ /dev/null @@ -1,169 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - eventing.knative.dev/release: v0.14.2 - knative.dev/crd-install: "true" - name: triggers.eventing.knative.dev -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[?(@.type=="Ready")].status - name: Ready - type: string - - JSONPath: .status.conditions[?(@.type=="Ready")].reason - name: Reason - type: string - - JSONPath: .spec.broker - name: Broker - type: string - - JSONPath: .status.subscriberUri - name: Subscriber_URI - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - conversion: - strategy: Webhook - webhookClientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - group: eventing.knative.dev - names: - categories: - - all - - knative - - eventing - kind: Trigger - plural: triggers - singular: trigger - preserveUnknownFields: false - scope: Namespaced - subresources: - status: {} - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - broker: - description: Broker that this trigger receives events from. If not - specified, will default to 'default'. - type: string - filter: - properties: - attributes: - additionalProperties: - type: string - description: Map of CloudEvents attributes used for filtering - events. - type: object - sourceAndType: - properties: - source: - type: string - type: - type: string - type: object - type: object - subscriber: - description: the destination that should receive events. - properties: - ref: - description: a reference to a Kubernetes object from which to - retrieve the target URI. - properties: - apiVersion: - minLength: 1 - type: string - kind: - minLength: 1 - type: string - name: - minLength: 1 - type: string - namespace: - minLength: 1 - type: string - required: - - apiVersion - - kind - - name - type: object - uri: - description: the target URI or, if ref is provided, a relative - URI reference that will be combined with ref to produce a target - URI. - type: string - type: object - required: - - subscriber - type: object - status: - type: object - x-kubernetes-preserve-unknown-fields: true - type: object - served: true - storage: true - - name: v1beta1 - schema: - openAPIV3Schema: - properties: - spec: - properties: - broker: - description: Broker that this trigger receives events from. If not - specified, will default to 'default'. - type: string - filter: - properties: - attributes: - additionalProperties: - type: string - description: Map of CloudEvents attributes used for filtering - events. - type: object - type: object - subscriber: - description: the destination that should receive events. - properties: - ref: - description: a reference to a Kubernetes object from which to - retrieve the target URI. - properties: - apiVersion: - minLength: 1 - type: string - kind: - minLength: 1 - type: string - name: - minLength: 1 - type: string - namespace: - minLength: 1 - type: string - required: - - apiVersion - - kind - - name - type: object - uri: - description: the target URI or, if ref is provided, a relative - URI reference that will be combined with ref to produce a target - URI. - type: string - type: object - required: - - subscriber - type: object - status: - type: object - x-kubernetes-preserve-unknown-fields: true - type: object - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-crds.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-crds.yaml deleted file mode 100644 index 1965eee6ba..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-crds.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - name: knative-eventing-crds - namespace: knative-eventing -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-eventing-crds - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-eventing-crds - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds diff --git a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/~g_v1_namespace_knative-eventing.yaml b/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/~g_v1_namespace_knative-eventing.yaml deleted file mode 100644 index a904f7f0f1..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-crds/test_data/expected/~g_v1_namespace_knative-eventing.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: v1 -kind: Namespace -metadata: - labels: - app.kubernetes.io/instance: knative-eventing-crds - app.kubernetes.io/name: knative-eventing-crds - eventing.knative.dev/release: v0.14.2 - name: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/kustomize_test.go b/tests/tests/legacy_kustomizations/knative-eventing-install/kustomize_test.go deleted file mode 100644 index 795b1d5607..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package knative_eventing_install - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/knative-eventing-install", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_sinkbindings.webhook.sources.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_sinkbindings.webhook.sources.knative.dev.yaml deleted file mode 100644 index b4c68f2212..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_sinkbindings.webhook.sources.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: sinkbindings.webhook.sources.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - failurePolicy: Fail - name: sinkbindings.webhook.sources.knative.dev - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.eventing.knative.dev.yaml deleted file mode 100644 index e2b0851bb7..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.eventing.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: webhook.eventing.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - failurePolicy: Fail - name: webhook.eventing.knative.dev - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.eventing.knative.dev.yaml deleted file mode 100644 index 3ad9741dce..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.eventing.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: config.webhook.eventing.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - failurePolicy: Fail - name: config.webhook.eventing.knative.dev - namespaceSelector: - matchExpressions: - - key: eventing.knative.dev/release - operator: Exists - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.eventing.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.eventing.knative.dev.yaml deleted file mode 100644 index 1733cd843f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.eventing.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: validation.webhook.eventing.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: eventing-webhook - namespace: knative-eventing - failurePolicy: Fail - name: validation.webhook.eventing.knative.dev - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-install.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-install.yaml deleted file mode 100644 index 6295efe8ea..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/app.k8s.io_v1beta1_application_knative-eventing-install.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - name: knative-eventing-install - namespace: knative-eventing -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-eventing-install - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-eventing-install - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_broker-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_broker-controller.yaml deleted file mode 100644 index a81c2b8da9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_broker-controller.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: broker-controller - namespace: knative-eventing -spec: - replicas: 1 - selector: - matchLabels: - app: broker-controller - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - template: - metadata: - labels: - app: broker-controller - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/eventing - - name: BROKER_INGRESS_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/broker/ingress@sha256:cfdaf7a48a22e3bab15e6b15e7ee387eb6406e00e9e4942e58b4a7bc8c2df3cf - - name: BROKER_INGRESS_SERVICE_ACCOUNT - value: eventing-broker-ingress - - name: BROKER_FILTER_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/broker/filter@sha256:ad578e71aad9c040087dd621fddd73f70ede4d03ae5425c79e8995d06ebb8aca - - name: BROKER_FILTER_SERVICE_ACCOUNT - value: eventing-broker-filter - - name: BROKER_IMAGE_PULL_SECRET_NAME - value: null - image: gcr.io/knative-releases/knative.dev/eventing/cmd/channel_broker@sha256:5065eaeb3904e8b0893255b11fdcdde54a6bac1d0d4ecc8c9ce4c4c32073d924 - name: eventing-controller - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - requests: - cpu: 100m - memory: 100Mi - securityContext: - allowPrivilegeEscalation: false - terminationMessagePolicy: FallbackToLogsOnError - serviceAccountName: eventing-controller diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-controller.yaml deleted file mode 100644 index 68b8f4d12e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-controller.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller - namespace: knative-eventing -spec: - replicas: 1 - selector: - matchLabels: - app: eventing-controller - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - template: - metadata: - labels: - app: eventing-controller - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/eventing - - name: PING_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/ping/adapter@sha256:c7272752928f6eeb9a66cf47c00b2d295ffb8517f2033dbbc8a5f461f6adafc2 - - name: JOB_RUNNER_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/ping/jobrunner@sha256:b47877189b1e0f23c2617875574b16505251ae45ea091969332266621af99af8 - - name: APISERVER_RA_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/apiserver_receive_adapter@sha256:717e08da76235229c5664240351ece8c70767768437c0a6d498210cdcc182f14 - image: gcr.io/knative-releases/knative.dev/eventing/cmd/controller@sha256:c99f08229c464407e5ba11f942d29b969e0f7dd2e242973d50d480cc45eebf28 - name: eventing-controller - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - requests: - cpu: 100m - memory: 100Mi - securityContext: - allowPrivilegeEscalation: false - terminationMessagePolicy: FallbackToLogsOnError - serviceAccountName: eventing-controller diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-webhook.yaml deleted file mode 100644 index f5aca9c030..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_eventing-webhook.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook - namespace: knative-eventing -spec: - replicas: 1 - selector: - matchLabels: - app: eventing-webhook - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - role: eventing-webhook - template: - metadata: - labels: - app: eventing-webhook - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - role: eventing-webhook - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: METRICS_DOMAIN - value: knative.dev/eventing - - name: WEBHOOK_NAME - value: eventing-webhook - - name: SINK_BINDING_SELECTION_MODE - value: exclusion - image: gcr.io/knative-releases/knative.dev/eventing/cmd/webhook@sha256:a3046d0426b4617fe9186fb3d983e350de82d2e3f33dcc13441e591e24410901 - name: eventing-webhook - ports: - - containerPort: 8443 - name: https-webhook - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 20m - memory: 20Mi - securityContext: - allowPrivilegeEscalation: false - terminationMessagePolicy: FallbackToLogsOnError - serviceAccountName: eventing-webhook diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-controller.yaml deleted file mode 100644 index 1d29722ba7..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-controller.yaml +++ /dev/null @@ -1,52 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-controller - namespace: knative-eventing -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: controller - template: - metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: controller - spec: - containers: - - env: - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/inmemorychannel-controller - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: DISPATCHER_IMAGE - value: gcr.io/knative-releases/knative.dev/eventing/cmd/in_memory/channel_dispatcher@sha256:8df896444091f1b34185f0fa3da5d41f32e84c43c48df07605c728e0fe49a9a8 - image: gcr.io/knative-releases/knative.dev/eventing/cmd/in_memory/channel_controller@sha256:9a084ba0ed6a12862adb3ca00de069f0ec1715fe8d4db6c9921fcca335c675bb - name: controller - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: imc-controller diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-dispatcher.yaml deleted file mode 100644 index 61f1a3f6bf..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/apps_v1_deployment_imc-dispatcher.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-dispatcher - namespace: knative-eventing -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: dispatcher - template: - metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: dispatcher - spec: - containers: - - env: - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/inmemorychannel-dispatcher - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/knative-releases/knative.dev/eventing/cmd/in_memory/channel_dispatcher@sha256:8df896444091f1b34185f0fa3da5d41f32e84c43c48df07605c728e0fe49a9a8 - name: dispatcher - ports: - - containerPort: 9090 - name: metrics - serviceAccountName: imc-dispatcher diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_addressable-resolver.yaml deleted file mode 100644 index e85c3d4ea0..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_addressable-resolver.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - duck.knative.dev/addressable: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: addressable-resolver -rules: [] diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_broker-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_broker-addressable-resolver.yaml deleted file mode 100644 index 60966ce973..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_broker-addressable-resolver.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: broker-addressable-resolver -rules: -- apiGroups: - - eventing.knative.dev - resources: - - brokers - - brokers/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_builtin-podspecable-binding.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_builtin-podspecable-binding.yaml deleted file mode 100644 index bf21bd81b5..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_builtin-podspecable-binding.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/podspecable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: builtin-podspecable-binding -rules: -- apiGroups: - - apps - resources: - - deployments - - daemonsets - - statefulsets - - replicasets - verbs: - - list - - watch - - patch -- apiGroups: - - batch - resources: - - jobs - verbs: - - list - - watch - - patch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channel-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channel-addressable-resolver.yaml deleted file mode 100644 index 5cbe58737f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channel-addressable-resolver.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: channel-addressable-resolver -rules: -- apiGroups: - - messaging.knative.dev - resources: - - channels - - channels/status - verbs: - - get - - list - - watch -- apiGroups: - - messaging.knative.dev - resources: - - channels/finalizers - verbs: - - update diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channelable-manipulator.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channelable-manipulator.yaml deleted file mode 100644 index 74326e34a7..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_channelable-manipulator.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - duck.knative.dev/channelable: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: channelable-manipulator -rules: [] diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-filter.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-filter.yaml deleted file mode 100644 index d9fee72711..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-filter.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-broker-filter -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - eventing.knative.dev - resources: - - triggers - - triggers/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-ingress.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-ingress.yaml deleted file mode 100644 index 88434f49ae..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-broker-ingress.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-broker-ingress -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-config-reader.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-config-reader.yaml deleted file mode 100644 index ee0d6058e9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-config-reader.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-config-reader -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-sources-source-observer.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-sources-source-observer.yaml deleted file mode 100644 index 8c5e04ed78..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_eventing-sources-source-observer.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/source: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-sources-source-observer -rules: -- apiGroups: - - sources.knative.dev - resources: - - apiserversources - - pingsources - - sinkbindings - - containersources - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_flows-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_flows-addressable-resolver.yaml deleted file mode 100644 index d8bee388d9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_flows-addressable-resolver.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: flows-addressable-resolver -rules: -- apiGroups: - - flows.knative.dev - resources: - - sequences - - sequences/status - - parallels - - parallels/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-addressable-resolver.yaml deleted file mode 100644 index 1639988331..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-addressable-resolver.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-addressable-resolver -rules: -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels - - inmemorychannels/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-channelable-manipulator.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-channelable-manipulator.yaml deleted file mode 100644 index d2a62a8305..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-channelable-manipulator.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/channelable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-channelable-manipulator -rules: -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels - - inmemorychannels/status - verbs: - - create - - get - - list - - watch - - update - - patch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-controller.yaml deleted file mode 100644 index bfd2382a3e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-controller.yaml +++ /dev/null @@ -1,102 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-controller -rules: -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels - - inmemorychannels/status - verbs: - - get - - list - - watch - - update -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - services - - serviceaccounts - verbs: - - get - - list - - watch - - create - - update - - patch -- apiGroups: - - "" - resources: - - endpoints - verbs: - - get - - list - - watch -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - verbs: - - get - - list - - watch - - create - - update - - patch -- apiGroups: - - apps - resources: - - deployments - verbs: - - get - - list - - watch - - create - - update - - patch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - get - - list - - watch - - create - - update - - patch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-dispatcher.yaml deleted file mode 100644 index a5c830edfa..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_imc-dispatcher.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-dispatcher -rules: -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels - - inmemorychannels/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - messaging.knative.dev - resources: - - inmemorychannels/status - verbs: - - update -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - get - - list - - watch - - create - - update - - patch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-channel-broker-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-channel-broker-controller.yaml deleted file mode 100644 index cfca220997..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-channel-broker-controller.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: knative-eventing-channel-broker-controller -rules: -- apiGroups: - - configs.internal.knative.dev - resources: - - configmappropagations - - configmappropagations/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - configs.internal.knative.dev - resources: - - configmappropagations/finalizers - verbs: - - update -- apiGroups: - - "" - resources: - - namespaces/finalizers - verbs: - - update -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-controller.yaml deleted file mode 100644 index 80a3cf009a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-controller.yaml +++ /dev/null @@ -1,133 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: knative-eventing-controller -rules: -- apiGroups: - - "" - resources: - - namespaces - - secrets - - configmaps - - services - - endpoints - - events - - serviceaccounts - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - eventing.knative.dev - resources: - - brokers - - brokers/status - - triggers - - triggers/status - - eventtypes - - eventtypes/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - eventing.knative.dev - resources: - - brokers/finalizers - - triggers/finalizers - verbs: - - update -- apiGroups: - - messaging.knative.dev - resources: - - sequences - - sequences/status - - channels - - channels/status - - parallels - - parallels/status - - subscriptions - - subscriptions/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - flows.knative.dev - resources: - - sequences - - sequences/status - - parallels - - parallels/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - messaging.knative.dev - resources: - - sequences/finalizers - - parallels/finalizers - - channels/finalizers - verbs: - - update -- apiGroups: - - flows.knative.dev - resources: - - sequences/finalizers - - parallels/finalizers - verbs: - - update -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-jobrunner.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-jobrunner.yaml deleted file mode 100644 index 5bea622965..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-jobrunner.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: knative-eventing-jobrunner -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - sources.knative.dev - resources: - - pingsources - - pingsources/status - verbs: - - get - - list - - watch - - patch -- apiGroups: - - sources.knative.dev - resources: - - pingsources/finalizers - verbs: - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-admin.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-admin.yaml deleted file mode 100644 index 7aef3c8a9d..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - name: knative-eventing-namespaced-admin -rules: -- apiGroups: - - eventing.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-edit.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-edit.yaml deleted file mode 100644 index cf086dc39d..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-edit.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-edit: "true" - name: knative-eventing-namespaced-edit -rules: -- apiGroups: - - eventing.knative.dev - - messaging.knative.dev - - flows.knative.dev - resources: - - '*' - verbs: - - create - - update - - patch - - delete diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-view.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-view.yaml deleted file mode 100644 index 72115f60be..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-namespaced-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-view: "true" - name: knative-eventing-namespaced-view -rules: -- apiGroups: - - eventing.knative.dev - - messaging.knative.dev - - sources.knative.dev - - flows.knative.dev - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-sources-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-sources-controller.yaml deleted file mode 100644 index 08cb48252f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-sources-controller.yaml +++ /dev/null @@ -1,101 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: knative-eventing-sources-controller -rules: -- apiGroups: - - "" - resources: - - secrets - - configmaps - - services - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - sources.knative.dev - resources: - - sinkbindings - - sinkbindings/status - - sinkbindings/finalizers - - apiserversources - - apiserversources/status - - apiserversources/finalizers - - pingsources - - pingsources/status - - pingsources/finalizers - - containersources - - containersources/status - - containersources/finalizers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - serving.knative.dev - resources: - - services - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - eventing.knative.dev - resources: - - eventtypes - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - authorization.k8s.io - resources: - - subjectaccessreviews - verbs: - - create diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-webhook.yaml deleted file mode 100644 index bf1719b253..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-eventing-webhook.yaml +++ /dev/null @@ -1,79 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: knative-eventing-webhook -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - create - - update - - list - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - get -- apiGroups: - - apps - resources: - - deployments/finalizers - verbs: - - update -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - sources.knative.dev - resources: - - sinkbindings - - sinkbindings/status - - sinkbindings/finalizers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-flows-namespaced-admin.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-flows-namespaced-admin.yaml deleted file mode 100644 index d40756e50b..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-flows-namespaced-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - name: knative-flows-namespaced-admin -rules: -- apiGroups: - - flows.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-messaging-namespaced-admin.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-messaging-namespaced-admin.yaml deleted file mode 100644 index 8974419ab1..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-messaging-namespaced-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - name: knative-messaging-namespaced-admin -rules: -- apiGroups: - - messaging.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-sources-namespaced-admin.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-sources-namespaced-admin.yaml deleted file mode 100644 index 85f52c9dff..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-sources-namespaced-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - name: knative-sources-namespaced-admin -rules: -- apiGroups: - - sources.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_messaging-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_messaging-addressable-resolver.yaml deleted file mode 100644 index 7200f37824..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_messaging-addressable-resolver.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: messaging-addressable-resolver -rules: -- apiGroups: - - messaging.knative.dev - resources: - - sequences - - sequences/status - - parallels - - parallels/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_podspecable-binding.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_podspecable-binding.yaml deleted file mode 100644 index 834638bda2..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_podspecable-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - duck.knative.dev/podspecable: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: podspecable-binding -rules: [] diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_service-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_service-addressable-resolver.yaml deleted file mode 100644 index 0f0461b43f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_service-addressable-resolver.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: service-addressable-resolver -rules: -- apiGroups: - - "" - resources: - - services - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_serving-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_serving-addressable-resolver.yaml deleted file mode 100644 index 4e65305243..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_serving-addressable-resolver.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - duck.knative.dev/addressable: "true" - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: serving-addressable-resolver -rules: -- apiGroups: - - serving.knative.dev - resources: - - routes - - routes/status - - services - - services/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_source-observer.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_source-observer.yaml deleted file mode 100644 index 135cc24835..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_source-observer.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - duck.knative.dev/source: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: source-observer -rules: [] diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-channel-broker-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-channel-broker-controller.yaml deleted file mode 100644 index eb8e10c6d4..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-channel-broker-controller.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-channel-broker-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-eventing-channel-broker-controller -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-manipulator.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-manipulator.yaml deleted file mode 100644 index 6953aa6f5e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-manipulator.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller-manipulator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: channelable-manipulator -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-resolver.yaml deleted file mode 100644 index f84efcd60a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-resolver.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller-resolver -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: addressable-resolver -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-source-observer.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-source-observer.yaml deleted file mode 100644 index f7f36dc6cf..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-source-observer.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller-source-observer -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: source-observer -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-sources-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-sources-controller.yaml deleted file mode 100644 index eeefe7dcd3..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller-sources-controller.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller-sources-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-eventing-sources-controller -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller.yaml deleted file mode 100644 index 608d7ea394..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-controller.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-eventing-controller -subjects: -- kind: ServiceAccount - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-podspecable-binding.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-podspecable-binding.yaml deleted file mode 100644 index 067a4d6dce..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-podspecable-binding.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook-podspecable-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: podspecable-binding -subjects: -- kind: ServiceAccount - name: eventing-webhook - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-resolver.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-resolver.yaml deleted file mode 100644 index 47e95b498f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook-resolver.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook-resolver -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: addressable-resolver -subjects: -- kind: ServiceAccount - name: eventing-webhook - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook.yaml deleted file mode 100644 index 0f2fd9c49e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_eventing-webhook.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-eventing-webhook -subjects: -- kind: ServiceAccount - name: eventing-webhook - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-controller.yaml deleted file mode 100644 index 853c61ef9c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-controller.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: imc-controller -subjects: -- kind: ServiceAccount - name: imc-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-dispatcher.yaml deleted file mode 100644 index 70402e09df..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_imc-dispatcher.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-dispatcher -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: imc-dispatcher -subjects: -- kind: ServiceAccount - name: imc-dispatcher - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_pingsource-jobrunner.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_pingsource-jobrunner.yaml deleted file mode 100644 index de4d0a2a46..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_pingsource-jobrunner.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: pingsource-jobrunner -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-eventing-jobrunner -subjects: -- kind: ServiceAccount - name: pingsource-jobrunner - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-default-channel.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-default-channel.yaml deleted file mode 100644 index bb13313a7b..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-default-channel.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -data: - channelTemplateSpec: | - apiVersion: messaging.knative.dev/v1alpha1 - kind: InMemoryChannel -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: config-br-default-channel - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-defaults.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-defaults.yaml deleted file mode 100644 index 3b5718a5e4..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-br-defaults.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: v1 -data: - default-br-config: | - clusterDefault: - brokerClass: ChannelBasedBroker - apiVersion: v1 - kind: ConfigMap - name: config-br-default-channel - namespace: knative-eventing -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: config-br-defaults - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-imc-event-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-imc-event-dispatcher.yaml deleted file mode 100644 index 585394e3b7..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-imc-event-dispatcher.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -data: - MaxIdleConnections: "1000" - MaxIdleConnectionsPerHost: "100" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: config-imc-event-dispatcher - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml deleted file mode 100644 index aacb6a426f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # resourceLock controls which API resource is used as the basis for the - # leader election lock. Valid values are: - # - # - leases -> use the coordination API - # - configmaps -> use configmaps - # - endpoints -> use endpoints - resourceLock: "leases" - - # leaseDuration is how long non-leaders will wait to try to acquire the - # lock; 15 seconds is the value used by core kubernetes controllers. - leaseDuration: "15s" - # renewDeadline is how long a leader will try to renew the lease before - # giving up; 10 seconds is the value used by core kubernetes controllers. - renewDeadline: "10s" - # retryPeriod is how long the leader election client waits between tries of - # actions; 2 seconds is the value used by core kuberntes controllers. - retryPeriod: "2s" - # enabledComponents is a comma-delimited list of component names for which - # leader election is enabled. Valid values are: - # - # - controller - # - broker-controller - # - inmemorychannel-dispatcher - # - inmemorychannel-controller - enabledComponents: "controller,broker-controller,inmemorychannel-dispatcher,inmemorychannel-controller" - leaseDuration: 15s - renewDeadline: 10s - resourceLock: leases - retryPeriod: 2s -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: config-leader-election - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-logging.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-logging.yaml deleted file mode 100644 index 821200d35a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-logging.yaml +++ /dev/null @@ -1,36 +0,0 @@ -apiVersion: v1 -data: - loglevel.controller: info - loglevel.webhook: info - zap-logger-config: | - { - "level": "info", - "development": false, - "outputPaths": ["stdout"], - "errorOutputPaths": ["stderr"], - "encoding": "json", - "encoderConfig": { - "timeKey": "ts", - "levelKey": "level", - "nameKey": "logger", - "callerKey": "caller", - "messageKey": "msg", - "stacktraceKey": "stacktrace", - "lineEnding": "", - "levelEncoder": "", - "timeEncoder": "iso8601", - "durationEncoder": "", - "callerEncoder": "" - } - } -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - knative.dev/config-category: eventing - knative.dev/config-propagation: original - kustomize.component: knative - name: config-logging - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-observability.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-observability.yaml deleted file mode 100644 index d08bd6b80d..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-observability.yaml +++ /dev/null @@ -1,56 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # metrics.backend-destination field specifies the system metrics destination. - # It supports either prometheus (the default) or stackdriver. - # Note: Using stackdriver will incur additional charges - metrics.backend-destination: prometheus - - # metrics.request-metrics-backend-destination specifies the request metrics - # destination. If non-empty, it enables queue proxy to send request metrics. - # Currently supported values: prometheus, stackdriver. - metrics.request-metrics-backend-destination: prometheus - - # metrics.stackdriver-project-id field specifies the stackdriver project ID. This - # field is optional. When running on GCE, application default credentials will be - # used if this field is not provided. - metrics.stackdriver-project-id: "" - - # metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to - # Stackdriver using "global" resource type and custom metric type if the - # metrics are not supported by "knative_broker", "knative_trigger", and "knative_source" resource types. - # Setting this flag to "true" could cause extra Stackdriver charge. - # If metrics.backend-destination is not Stackdriver, this is ignored. - metrics.allow-stackdriver-custom-metrics: "false" - - # profiling.enable indicates whether it is allowed to retrieve runtime profiling data from - # the pods via an HTTP server in the format expected by the pprof visualization tool. When - # enabled, the Knative Eventing pods expose the profiling data on an alternate HTTP port 8008. - # The HTTP context root for profiling is then /debug/pprof/. - profiling.enable: "false" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - knative.dev/config-category: eventing - knative.dev/config-propagation: original - kustomize.component: knative - name: config-observability - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-tracing.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-tracing.yaml deleted file mode 100644 index be2bb6d0de..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_config-tracing.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - # - # This may be "zipkin" or "stackdriver", the default is "none" - backend: "none" - - # URL to zipkin collector where traces are sent. - # This must be specified when backend is "zipkin" - zipkin-endpoint: "http://zipkin.istio-system.svc.cluster.local:9411/api/v2/spans" - - # The GCP project into which stackdriver metrics will be written - # when backend is "stackdriver". If unspecified, the project-id - # is read from GCP metadata when running on GCP. - stackdriver-project-id: "my-project" - - # Enable zipkin debug mode. This allows all spans to be sent to the server - # bypassing sampling. - debug: "false" - - # Percentage (0-1) of requests to trace - sample-rate: "0.1" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - knative.dev/config-category: eventing - knative.dev/config-propagation: original - kustomize.component: knative - name: config-tracing - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_default-ch-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_default-ch-webhook.yaml deleted file mode 100644 index 0dc96e5681..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_configmap_default-ch-webhook.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -data: - default-ch-config: | - clusterDefault: - apiVersion: messaging.knative.dev/v1beta1 - kind: InMemoryChannel - namespaceDefaults: - some-namespace: - apiVersion: messaging.knative.dev/v1beta1 - kind: InMemoryChannel -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: default-ch-webhook - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_secret_eventing-webhook-certs.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_secret_eventing-webhook-certs.yaml deleted file mode 100644 index 2d685a6379..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_secret_eventing-webhook-certs.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook-certs - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-filter.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-filter.yaml deleted file mode 100644 index 367bc58250..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-filter.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/brokerRole: filter - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: broker-filter - namespace: knative-eventing -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 8080 - - name: http-metrics - port: 9090 - protocol: TCP - targetPort: 9090 - selector: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/brokerRole: filter - kustomize.component: knative diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-ingress.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-ingress.yaml deleted file mode 100644 index 2916fd401c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_broker-ingress.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/brokerRole: ingress - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: broker-ingress - namespace: knative-eventing -spec: - ports: - - name: http - port: 80 - protocol: TCP - targetPort: 8080 - - name: http-metrics - port: 9090 - protocol: TCP - targetPort: 9090 - selector: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/brokerRole: ingress - kustomize.component: knative diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_eventing-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_eventing-webhook.yaml deleted file mode 100644 index 6a5a69b2af..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_eventing-webhook.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - role: eventing-webhook - name: eventing-webhook - namespace: knative-eventing -spec: - ports: - - name: https-webhook - port: 443 - targetPort: 8443 - selector: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - role: eventing-webhook diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_imc-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_imc-dispatcher.yaml deleted file mode 100644 index 7e4a4a826e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_service_imc-dispatcher.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: dispatcher - name: imc-dispatcher - namespace: knative-eventing -spec: - ports: - - name: http-dispatcher - port: 80 - protocol: TCP - targetPort: 8080 - selector: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - kustomize.component: knative - messaging.knative.dev/channel: in-memory-channel - messaging.knative.dev/role: dispatcher diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-controller.yaml deleted file mode 100644 index cb16699cf9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-controller.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml deleted file mode 100644 index f75334b926..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_eventing-webhook.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: eventing-webhook - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-controller.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-controller.yaml deleted file mode 100644 index eb17420039..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-controller.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-controller - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-dispatcher.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-dispatcher.yaml deleted file mode 100644 index a8f2fd42de..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_imc-dispatcher.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: imc-dispatcher - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_pingsource-jobrunner.yaml b/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_pingsource-jobrunner.yaml deleted file mode 100644 index 788645302a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-eventing-install/test_data/expected/~g_v1_serviceaccount_pingsource-jobrunner.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-eventing-install - app.kubernetes.io/name: knative-eventing-install - eventing.knative.dev/release: v0.14.2 - kustomize.component: knative - name: pingsource-jobrunner - namespace: knative-eventing diff --git a/tests/tests/legacy_kustomizations/knative-install/kustomize_test.go b/tests/tests/legacy_kustomizations/knative-install/kustomize_test.go deleted file mode 100644 index 1ab3add367..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package knative_install - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/knative-install", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml deleted file mode 100644 index fd97bf71da..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.istio.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook.istio.networking.internal.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: istio-webhook - namespace: knative-serving - failurePolicy: Fail - name: webhook.istio.networking.internal.knative.dev - objectSelector: - matchExpressions: - - key: serving.knative.dev/configuration - operator: Exists - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml deleted file mode 100644 index 5d47d27bc3..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: knative-serving - failurePolicy: Fail - name: webhook.serving.knative.dev - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml deleted file mode 100644 index 75565e138c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.istio.networking.internal.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config.webhook.istio.networking.internal.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: istio-webhook - namespace: knative-serving - failurePolicy: Fail - name: config.webhook.istio.networking.internal.knative.dev - namespaceSelector: - matchExpressions: - - key: serving.knative.dev/release - operator: Exists - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml deleted file mode 100644 index a1eb2635fb..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_config.webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config.webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: knative-serving - failurePolicy: Fail - name: config.webhook.serving.knative.dev - namespaceSelector: - matchExpressions: - - key: serving.knative.dev/release - operator: Exists - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml deleted file mode 100644 index 18362777de..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_validation.webhook.serving.knative.dev.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: validation.webhook.serving.knative.dev -webhooks: -- admissionReviewVersions: - - v1beta1 - clientConfig: - service: - name: webhook - namespace: knative-serving - failurePolicy: Fail - name: validation.webhook.serving.knative.dev - sideEffects: None diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml deleted file mode 100644 index fbf4f86ccf..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/app.k8s.io_v1beta1_application_knative-serving-install.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - name: knative-serving-install - namespace: knative-serving -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - knative-serving-install - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: knative-serving-install - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_activator.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_activator.yaml deleted file mode 100644 index 401d70c18f..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_activator.yaml +++ /dev/null @@ -1,86 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator - namespace: knative-serving -spec: - selector: - matchLabels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: activator - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: activator - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: GOGC - value: "500" - - name: POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - - name: POD_IP - valueFrom: - fieldRef: - fieldPath: status.podIP - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/internal/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/activator@sha256:ffa3d72ee6c2eeb2357999248191a643405288061b7080381f22875cb703e929 - livenessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: activator - port: 8012 - name: activator - ports: - - containerPort: 8012 - name: http1 - - containerPort: 8013 - name: h2c - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - readinessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: activator - port: 8012 - resources: - limits: - cpu: 1000m - memory: 600Mi - requests: - cpu: 300m - memory: 60Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller - terminationGracePeriodSeconds: 300 diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_autoscaler.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_autoscaler.yaml deleted file mode 100644 index 8fb170ba04..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_autoscaler.yaml +++ /dev/null @@ -1,77 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: autoscaler - namespace: knative-serving -spec: - replicas: 1 - selector: - matchLabels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - args: - - --secure-port=8443 - - --cert-dir=/tmp - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/autoscaler@sha256:f89fd23889c3e0ca3d8e42c9b189dc2f93aa5b3a91c64e8aab75e952a210eeb3 - livenessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: autoscaler - port: 8080 - name: autoscaler - ports: - - containerPort: 8080 - name: websocket - - containerPort: 9090 - name: metrics - - containerPort: 8443 - name: custom-metrics - - containerPort: 8008 - name: profiling - readinessProbe: - httpGet: - httpHeaders: - - name: k-kubelet-probe - value: autoscaler - port: 8080 - resources: - limits: - cpu: 300m - memory: 400Mi - requests: - cpu: 30m - memory: 40Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_controller.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_controller.yaml deleted file mode 100644 index a02cf3c5e9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_controller.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: knative-serving -spec: - selector: - matchLabels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" - labels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/internal/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/controller@sha256:b86ac8ecc6b2688a0e0b9cb68298220a752125d0a048b8edf2cf42403224393c - name: controller - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - limits: - cpu: 1000m - memory: 1000Mi - requests: - cpu: 100m - memory: 100Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_istio-webhook.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_istio-webhook.yaml deleted file mode 100644 index 28fef49ad8..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_istio-webhook.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: istio-webhook - namespace: knative-serving -spec: - selector: - matchLabels: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/net-istio - - name: WEBHOOK_NAME - value: istio-webhook - image: gcr.io/knative-releases/knative.dev/net-istio/cmd/webhook@sha256:e6b142c0f82e0e0b8cb670c11eb4eef6ded827f98761bbf4bea7bdb777b80092 - name: webhook - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - - containerPort: 8443 - name: https-webhook - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 20m - memory: 20Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_networking-istio.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_networking-istio.yaml deleted file mode 100644 index 3923fd41c5..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_networking-istio.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: networking-istio - namespace: knative-serving -spec: - selector: - matchLabels: - app: networking-istio - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "true" - sidecar.istio.io/inject: "false" - labels: - app: networking-istio - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/net-istio - image: gcr.io/knative-releases/knative.dev/net-istio/cmd/controller@sha256:75c7918ca887622e7242ec1965f87036db1dc462464810b72735a8e64111f6f7 - name: networking-istio - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - resources: - limits: - cpu: 300m - memory: 400Mi - requests: - cpu: 30m - memory: 40Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_webhook.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_webhook.yaml deleted file mode 100644 index 7ebbcd2c6e..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/apps_v1_deployment_webhook.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook - namespace: knative-serving -spec: - selector: - matchLabels: - app: webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - template: - metadata: - annotations: - cluster-autoscaler.kubernetes.io/safe-to-evict: "false" - labels: - app: webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - serving.knative.dev/release: v0.14.3 - spec: - containers: - - env: - - name: SYSTEM_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONFIG_LOGGING_NAME - value: config-logging - - name: CONFIG_OBSERVABILITY_NAME - value: config-observability - - name: METRICS_DOMAIN - value: knative.dev/serving - image: gcr.io/knative-releases/knative.dev/serving/cmd/webhook@sha256:7e6df0fda229a13219bbc90ff72a10434a0c64cd7fe13dc534b914247d1087f4 - name: webhook - ports: - - containerPort: 9090 - name: metrics - - containerPort: 8008 - name: profiling - - containerPort: 8443 - name: https-webhook - resources: - limits: - cpu: 200m - memory: 200Mi - requests: - cpu: 20m - memory: 20Mi - securityContext: - allowPrivilegeEscalation: false - serviceAccountName: controller diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml deleted file mode 100644 index 0d30bfe946..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/autoscaling_v2beta1_horizontalpodautoscaler_activator.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: autoscaling/v2beta1 -kind: HorizontalPodAutoscaler -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator - namespace: knative-serving -spec: - maxReplicas: 20 - metrics: - - resource: - name: cpu - targetAverageUtilization: 100 - type: Resource - minReplicas: 1 - scaleTargetRef: - apiVersion: apps/v1 - kind: Deployment - name: activator diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml deleted file mode 100644 index 6a75ea5377..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/caching.internal.knative.dev_v1alpha1_image_queue-proxy.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: caching.internal.knative.dev/v1alpha1 -kind: Image -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: queue-proxy - namespace: knative-serving -spec: - image: gcr.io/knative-releases/knative.dev/serving/cmd/queue@sha256:d066ae5b642885827506610ae25728d442ce11447b82df6e9cc4c174bb97ecb3 diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml deleted file mode 100644 index eefda25e7a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/networking.istio.io_v1alpha3_gateway_cluster-local-gateway.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: Gateway -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: cluster-local-gateway - namespace: knative-serving -spec: - selector: - istio: cluster-local-gateway - servers: - - hosts: - - '*' - port: - name: http - number: 80 - protocol: HTTP diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml deleted file mode 100644 index e59f35d5f4..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-addressable-resolver.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/addressable: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-addressable-resolver -rules: -- apiGroups: - - serving.knative.dev - resources: - - routes - - routes/status - - services - - services/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml deleted file mode 100644 index defbbc5955..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-admin.yaml +++ /dev/null @@ -1,14 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - serving.knative.dev/controller: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml deleted file mode 100644 index 522c106ceb..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-core.yaml +++ /dev/null @@ -1,128 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/controller: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-core -rules: -- apiGroups: - - "" - resources: - - pods - - namespaces - - secrets - - configmaps - - endpoints - - services - - events - - serviceaccounts - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - "" - resources: - - endpoints/restricted - verbs: - - create -- apiGroups: - - apps - resources: - - deployments - - deployments/finalizers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - - validatingwebhookconfigurations - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - - customresourcedefinitions/status - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - coordination.k8s.io - resources: - - leases - verbs: - - get - - list - - create - - update - - delete - - patch - - watch -- apiGroups: - - serving.knative.dev - - autoscaling.internal.knative.dev - - networking.internal.knative.dev - resources: - - '*' - - '*/status' - - '*/finalizers' - verbs: - - get - - list - - create - - update - - delete - - deletecollection - - patch - - watch -- apiGroups: - - caching.internal.knative.dev - resources: - - images - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml deleted file mode 100644 index 81fd9a6fbc..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-istio.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/controller: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-istio -rules: -- apiGroups: - - networking.istio.io - resources: - - virtualservices - - gateways - verbs: - - get - - list - - create - - update - - delete - - patch - - watch diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml deleted file mode 100644 index 1b1d7787c0..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-admin.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-admin: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-admin -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml deleted file mode 100644 index 78264a1553..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-edit.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-edit: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-edit -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - create - - update - - patch - - delete diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml deleted file mode 100644 index 0bad4a4ced..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-namespaced-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - rbac.authorization.k8s.io/aggregate-to-view: "true" - serving.knative.dev/release: v0.14.3 - name: knative-serving-namespaced-view -rules: -- apiGroups: - - serving.knative.dev - - networking.internal.knative.dev - - autoscaling.internal.knative.dev - - caching.internal.knative.dev - resources: - - '*' - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml deleted file mode 100644 index f1de7a3fdc..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_knative-serving-podspecable-binding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - duck.knative.dev/podspecable: "true" - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-podspecable-binding -rules: -- apiGroups: - - serving.knative.dev - resources: - - configurations - - services - verbs: - - list - - watch - - patch diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml deleted file mode 100644 index b1d74ef082..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_knative-serving-controller-admin.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: knative-serving-controller-admin -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: knative-serving-admin -subjects: -- kind: ServiceAccount - name: controller - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml deleted file mode 100644 index 0597e87c63..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerole_istio-service-role.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRole -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: istio-service-role - namespace: knative-serving -spec: - rules: - - methods: - - '*' - services: - - '*' diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml deleted file mode 100644 index 42dda4d2bf..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/rbac.istio.io_v1alpha1_servicerolebinding_istio-service-role-binding.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: rbac.istio.io/v1alpha1 -kind: ServiceRoleBinding -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - name: istio-service-role-binding - namespace: knative-serving -spec: - roleRef: - kind: ServiceRole - name: istio-service-role - subjects: - - user: '*' diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-autoscaler.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-autoscaler.yaml deleted file mode 100644 index 54332e2ea8..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-autoscaler.yaml +++ /dev/null @@ -1,149 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # The Revision ContainerConcurrency field specifies the maximum number - # of requests the Container can handle at once. Container concurrency - # target percentage is how much of that maximum to use in a stable - # state. E.g. if a Revision specifies ContainerConcurrency of 10, then - # the Autoscaler will try to maintain 7 concurrent connections per pod - # on average. - # Note: this limit will be applied to container concurrency set at every - # level (ConfigMap, Revision Spec or Annotation). - # For legacy and backwards compatibility reasons, this value also accepts - # fractional values in (0, 1] interval (i.e. 0.7 ⇒ 70%). - # Thus minimal percentage value must be greater than 1.0, or it will be - # treated as a fraction. - # NOTE: that this value does not affect actual number of concurrent requests - # the user container may receive, but only the average number of requests - # that the revision pods will receive. - container-concurrency-target-percentage: "70" - - # The container concurrency target default is what the Autoscaler will - # try to maintain when concurrency is used as the scaling metric for the - # Revision and the Revision specifies unlimited concurrency. - # When revision explicitly specifies container concurrency, that value - # will be used as a scaling target for autoscaler. - # When specifying unlimited concurrency, the autoscaler will - # horizontally scale the application based on this target concurrency. - # This is what we call "soft limit" in the documentation, i.e. it only - # affects number of pods and does not affect the number of requests - # individual pod processes. - # The value must be a positive number such that the value multiplied - # by container-concurrency-target-percentage is greater than 0.01. - # NOTE: that this value will be adjusted by application of - # container-concurrency-target-percentage, i.e. by default - # the system will target on average 70 concurrent requests - # per revision pod. - # NOTE: Only one metric can be used for autoscaling a Revision. - container-concurrency-target-default: "100" - - # The requests per second (RPS) target default is what the Autoscaler will - # try to maintain when RPS is used as the scaling metric for a Revision and - # the Revision specifies unlimited RPS. Even when specifying unlimited RPS, - # the autoscaler will horizontally scale the application based on this - # target RPS. - # Must be greater than 1.0. - # NOTE: Only one metric can be used for autoscaling a Revision. - requests-per-second-target-default: "200" - - # The target burst capacity specifies the size of burst in concurrent - # requests that the system operator expects the system will receive. - # Autoscaler will try to protect the system from queueing by introducing - # Activator in the request path if the current spare capacity of the - # service is less than this setting. - # If this setting is 0, then Activator will be in the request path only - # when the revision is scaled to 0. - # If this setting is > 0 and container-concurrency-target-percentage is - # 100% or 1.0, then activator will always be in the request path. - # -1 denotes unlimited target-burst-capacity and activator will always - # be in the request path. - # Other negative values are invalid. - target-burst-capacity: "200" - - # When operating in a stable mode, the autoscaler operates on the - # average concurrency over the stable window. - # Stable window must be in whole seconds. - stable-window: "60s" - - # When observed average concurrency during the panic window reaches - # panic-threshold-percentage the target concurrency, the autoscaler - # enters panic mode. When operating in panic mode, the autoscaler - # scales on the average concurrency over the panic window which is - # panic-window-percentage of the stable-window. - # When computing the panic window it will be rounded to the closest - # whole second. - panic-window-percentage: "10.0" - - # The percentage of the container concurrency target at which to - # enter panic mode when reached within the panic window. - panic-threshold-percentage: "200.0" - - # Max scale up rate limits the rate at which the autoscaler will - # increase pod count. It is the maximum ratio of desired pods versus - # observed pods. - # Cannot be less or equal to 1. - # I.e with value of 2.0 the number of pods can at most go N to 2N - # over single Autoscaler period (see tick-interval), but at least N to - # N+1, if Autoscaler needs to scale up. - max-scale-up-rate: "1000.0" - - # Max scale down rate limits the rate at which the autoscaler will - # decrease pod count. It is the maximum ratio of observed pods versus - # desired pods. - # Cannot be less or equal to 1. - # I.e. with value of 2.0 the number of pods can at most go N to N/2 - # over single Autoscaler evaluation period (see tick-interval), but at - # least N to N-1, if Autoscaler needs to scale down. - max-scale-down-rate: "2.0" - - # Scale to zero feature flag - enable-scale-to-zero: "true" - - # Tick interval is the time between autoscaling calculations. - tick-interval: "2s" - - # Scale to zero grace period is the time an inactive revision is left - # running before it is scaled to zero (min: 6s). - scale-to-zero-grace-period: "30s" - - # Enable graceful scaledown feature flag. - # Once enabled, it allows the autoscaler to prioritize pods processing - # fewer (or zero) requests for removal when scaling down. - enable-graceful-scaledown: "false" - - # pod-autoscaler-class specifies the default pod autoscaler class - # that should be used if none is specified. If omitted, the Knative - # Horizontal Pod Autoscaler (KPA) is used by default. - pod-autoscaler-class: "kpa.autoscaling.knative.dev" - - # The capacity of a single activator task. - # The `unit` is one concurrent request proxied by the activator. - # activator-capacity must be at least 1. - # This value is used for computation of the Activator subset size. - # See the algorithm here: http://bit.ly/38XiCZ3. - # TODO(vagababov): tune after actual benchmarking. - activator-capacity: "100.0" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-autoscaler - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-defaults.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-defaults.yaml deleted file mode 100644 index 71f1b99d63..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-defaults.yaml +++ /dev/null @@ -1,81 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # revision-timeout-seconds contains the default number of - # seconds to use for the revision's per-request timeout, if - # none is specified. - revision-timeout-seconds: "300" # 5 minutes - - # max-revision-timeout-seconds contains the maximum number of - # seconds that can be used for revision-timeout-seconds. - # This value must be greater than or equal to revision-timeout-seconds. - # If omitted, the system default is used (600 seconds). - max-revision-timeout-seconds: "600" # 10 minutes - - # revision-cpu-request contains the cpu allocation to assign - # to revisions by default. If omitted, no value is specified - # and the system default is used. - revision-cpu-request: "400m" # 0.4 of a CPU (aka 400 milli-CPU) - - # revision-memory-request contains the memory allocation to assign - # to revisions by default. If omitted, no value is specified - # and the system default is used. - revision-memory-request: "100M" # 100 megabytes of memory - - # revision-cpu-limit contains the cpu allocation to limit - # revisions to by default. If omitted, no value is specified - # and the system default is used. - revision-cpu-limit: "1000m" # 1 CPU (aka 1000 milli-CPU) - - # revision-memory-limit contains the memory allocation to limit - # revisions to by default. If omitted, no value is specified - # and the system default is used. - revision-memory-limit: "200M" # 200 megabytes of memory - - # container-name-template contains a template for the default - # container name, if none is specified. This field supports - # Go templating and is supplied with the ObjectMeta of the - # enclosing Service or Configuration, so values such as - # {{.Name}} are also valid. - container-name-template: "user-container" - - # container-concurrency specifies the maximum number - # of requests the Container can handle at once, and requests - # above this threshold are queued. Setting a value of zero - # disables this throttling and lets through as many requests as - # the pod receives. - container-concurrency: "0" - - # The container concurrency max limit is an operator setting ensuring that - # the individual revisions cannot have arbitrary large concurrency - # values, or autoscaling targets. `container-concurrency` default setting - # must be at or below this value. - # Must be greater than 1. - container-concurrency-max-limit: "1000" - - # feature flag indicates whether to enable multi container support or not - enable-multi-container: "false" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-defaults - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-deployment.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-deployment.yaml deleted file mode 100644 index f4198ab265..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-deployment.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # List of repositories for which tag to digest resolving should be skipped - registriesSkippingTagResolving: "ko.local,dev.local" - queueSidecarImage: gcr.io/knative-releases/knative.dev/serving/cmd/queue@sha256:d066ae5b642885827506610ae25728d442ce11447b82df6e9cc4c174bb97ecb3 -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-deployment - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-domain.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-domain.yaml deleted file mode 100644 index 6af8c0a9b4..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-domain.yaml +++ /dev/null @@ -1,47 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Default value for domain. - # Although it will match all routes, it is the least-specific rule so it - # will only be used if no other domain matches. - example.com: | - - # These are example settings of domain. - # example.org will be used for routes having app=nonprofit. - example.org: | - selector: - app: nonprofit - - # Routes having domain suffix of 'svc.cluster.local' will not be exposed - # through Ingress. You can define your own label selector to assign that - # domain suffix to your Route here, or you can set the label - # "serving.knative.dev/visibility=cluster-local" - # to achieve the same effect. This shows how to make routes having - # the label app=secret only exposed to the local cluster. - svc.cluster.local: | - selector: - app: secret -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-domain - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-gc.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-gc.yaml deleted file mode 100644 index 8514f7d831..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-gc.yaml +++ /dev/null @@ -1,43 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Delay after revision creation before considering it for GC - stale-revision-create-delay: "48h" - - # Duration since a route has pointed at the revision before it - # should be GC'd. - # This minus lastpinned-debounce must be longer than the controller - # resync period (10 hours). - stale-revision-timeout: "15h" - - # Minimum number of generations of revisions to keep before considering - # them for GC - stale-revision-minimum-generations: "20" - - # To avoid constant updates, we allow an existing annotation to be stale by this - # amount before we update the timestamp. - stale-revision-lastpinned-debounce: "5h" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-gc - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-istio.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-istio.yaml deleted file mode 100644 index 0726f2e111..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-istio.yaml +++ /dev/null @@ -1,59 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Default Knative Gateway after v0.3. It points to the Istio - # standard istio-ingressgateway, instead of a custom one that we - # used pre-0.3. The configuration format should be `gateway. - # {{gateway_namespace}}.{{gateway_name}}: "{{ingress_name}}. - # {{ingress_namespace}}.svc.cluster.local"`. The {{gateway_namespace}} - # is optional; when it is omitted, the system will search for - # the gateway in the serving system namespace `knative-serving` - gateway.knative-serving.knative-ingress-gateway: "istio-ingressgateway.istio-system.svc.cluster.local" - - # A cluster local gateway to allow pods outside of the mesh to access - # Services and Routes not exposing through an ingress. If the users - # do have a service mesh setup, this isn't required and can be removed. - # - # An example use case is when users want to use Istio without any - # sidecar injection (like Knative's istio-ci-no-mesh.yaml). Since every pod - # is outside of the service mesh in that case, a cluster-local service - # will need to be exposed to a cluster-local gateway to be accessible. - # The configuration format should be `local-gateway.{{local_gateway_namespace}}. - # {{local_gateway_name}}: "{{cluster_local_gateway_name}}. - # {{cluster_local_gateway_namespace}}.svc.cluster.local"`. The - # {{local_gateway_namespace}} is optional; when it is omitted, the system - # will search for the local gateway in the serving system namespace - # `knative-serving` - local-gateway.knative-serving.cluster-local-gateway: "cluster-local-gateway.istio-system.svc.cluster.local" - - # To use only Istio service mesh and no cluster-local-gateway, replace - # all local-gateway.* entries by the following entry. - local-gateway.mesh: "mesh" - gateway.kubeflow.kubeflow-gateway: istio-ingressgateway.istio-system.svc.cluster.local - local-gateway.knative-serving.cluster-local-gateway: cluster-local-gateway.istio-system.svc.cluster.local - local-gateway.mesh: mesh -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - networking.knative.dev/ingress-provider: istio - serving.knative.dev/release: v0.14.3 - name: config-istio - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml deleted file mode 100644 index 24eeea33c9..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-leader-election.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # resourceLock controls which API resource is used as the basis for the - # leader election lock. Valid values are: - # - # - leases -> use the coordination API - # - configmaps -> use configmaps - # - endpoints -> use endpoints - resourceLock: "leases" - - # leaseDuration is how long non-leaders will wait to try to acquire the - # lock; 15 seconds is the value used by core kubernetes controllers. - leaseDuration: "15s" - # renewDeadline is how long a leader will try to renew the lease before - # giving up; 10 seconds is the value used by core kubernetes controllers. - renewDeadline: "10s" - # retryPeriod is how long the leader election client waits between tries of - # actions; 2 seconds is the value used by core kubernetes controllers. - retryPeriod: "2s" - # enabledComponents is a comma-delimited list of component names for which - # leader election is enabled. Valid values are: - # - # - controller - # - hpaautoscaler - # - certcontroller - # - istiocontroller - # - nscontroller - enabledComponents: "controller,hpaautoscaler,certcontroller,istiocontroller,nscontroller" - leaseDuration: 15s - renewDeadline: 10s - resourceLock: leases - retryPeriod: 2s -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-leader-election - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-logging.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-logging.yaml deleted file mode 100644 index 91a1f45712..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-logging.yaml +++ /dev/null @@ -1,63 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # Common configuration for all Knative codebase - zap-logger-config: | - { - "level": "info", - "development": false, - "outputPaths": ["stdout"], - "errorOutputPaths": ["stderr"], - "encoding": "json", - "encoderConfig": { - "timeKey": "ts", - "levelKey": "level", - "nameKey": "logger", - "callerKey": "caller", - "messageKey": "msg", - "stacktraceKey": "stacktrace", - "lineEnding": "", - "levelEncoder": "", - "timeEncoder": "iso8601", - "durationEncoder": "", - "callerEncoder": "" - } - } - - # Log level overrides - # For all components except the autoscaler and queue proxy, - # changes are be picked up immediately. - # For autoscaler and queue proxy, changes require recreation of the pods. - loglevel.controller: "info" - loglevel.autoscaler: "info" - loglevel.queueproxy: "info" - loglevel.webhook: "info" - loglevel.activator: "info" - loglevel.hpaautoscaler: "info" - loglevel.certcontroller: "info" - loglevel.istiocontroller: "info" - loglevel.nscontroller: "info" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-logging - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-network.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-network.yaml deleted file mode 100644 index 1560084c2a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-network.yaml +++ /dev/null @@ -1,94 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - - # DEPRECATED: - # istio.sidecar.includeOutboundIPRanges is obsolete. - # The current versions have outbound network access enabled by default. - # If you need this option for some reason, please use global.proxy.includeIPRanges in Istio. - # - # istio.sidecar.includeOutboundIPRanges: "*" - - # ingress.class specifies the default ingress class - # to use when not dictated by Route annotation. - # - # If not specified, will use the Istio ingress. - # - # Note that changing the Ingress class of an existing Route - # will result in undefined behavior. Therefore it is best to only - # update this value during the setup of Knative, to avoid getting - # undefined behavior. - ingress.class: "istio.ingress.networking.knative.dev" - - # certificate.class specifies the default Certificate class - # to use when not dictated by Route annotation. - # - # If not specified, will use the Cert-Manager Certificate. - # - # Note that changing the Certificate class of an existing Route - # will result in undefined behavior. Therefore it is best to only - # update this value during the setup of Knative, to avoid getting - # undefined behavior. - certificate.class: "cert-manager.certificate.networking.knative.dev" - - # domainTemplate specifies the golang text template string to use - # when constructing the Knative service's DNS name. The default - # value is "{{.Name}}.{{.Namespace}}.{{.Domain}}". And those three - # values (Name, Namespace, Domain) are the only variables defined. - # - # Changing this value might be necessary when the extra levels in - # the domain name generated is problematic for wildcard certificates - # that only support a single level of domain name added to the - # certificate's domain. In those cases you might consider using a value - # of "{{.Name}}-{{.Namespace}}.{{.Domain}}", or removing the Namespace - # entirely from the template. When choosing a new value be thoughtful - # of the potential for conflicts - for example, when users choose to use - # characters such as `-` in their service, or namespace, names. - # {{.Annotations}} can be used for any customization in the go template if needed. - # We strongly recommend keeping namespace part of the template to avoid domain name clashes - # Example '{{.Name}}-{{.Namespace}}.{{ index .Annotations "sub"}}.{{.Domain}}' - # and you have an annotation {"sub":"foo"}, then the generated template would be {Name}-{Namespace}.foo.{Domain} - domainTemplate: "{{.Name}}.{{.Namespace}}.{{.Domain}}" - - # tagTemplate specifies the golang text template string to use - # when constructing the DNS name for "tags" within the traffic blocks - # of Routes and Configuration. This is used in conjunction with the - # domainTemplate above to determine the full URL for the tag. - tagTemplate: "{{.Tag}}-{{.Name}}" - - # Controls whether TLS certificates are automatically provisioned and - # installed in the Knative ingress to terminate external TLS connection. - # 1. Enabled: enabling auto-TLS feature. - # 2. Disabled: disabling auto-TLS feature. - autoTLS: "Disabled" - - # Controls the behavior of the HTTP endpoint for the Knative ingress. - # It requires autoTLS to be enabled. - # 1. Enabled: The Knative ingress will be able to serve HTTP connection. - # 2. Disabled: The Knative ingress will reject HTTP traffic. - # 3. Redirected: The Knative ingress will send a 302 redirect for all - # http connections, asking the clients to use HTTPS - httpProtocol: "Enabled" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-network - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-observability.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-observability.yaml deleted file mode 100644 index 4d8325b1a8..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-observability.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ # # # EXAMPLE CONFIGURATION # # # ################################ - - # This block is not actually functional configuration, # but serves to illustrate the available configuration # options and document them in a way that is accessible # to users that `kubectl edit` this config map. # - # These sample configuration options may be copied out of # this example block and unindented to be in the data block # to actually change the configuration. - # logging.enable-var-log-collection defaults to false. # The fluentd daemon set will be set up to collect /var/log if # this flag is true. logging.enable-var-log-collection: "false" - # logging.revision-url-template provides a template to use for producing the # logging URL that is injected into the status of each Revision. # This value is what you might use the the Knative monitoring bundle, and provides # access to Kibana after setting up kubectl proxy. logging.revision-url-template: | - http://localhost:8001/api/v1/namespaces/knative-monitoring/services/kibana-logging/proxy/app/kibana#/discover?_a=(query:(match:(kubernetes.labels.serving-knative-dev%2FrevisionUID:(query:'${REVISION_UID}',type:phrase)))) - - # If non-empty, this enables queue proxy writing user request logs to stdout, excluding probe # requests. # The value determines the shape of the request logs and it must be a valid go text/template. # It is important to keep this as a single line. Multiple lines are parsed as separate entities # by most collection agents and will split the request logs into multiple records. # # The following fields and functions are available to the template: # # Request: An http.Request (see https://golang.org/pkg/net/http/#Request) # representing an HTTP request received by the server. # # Response: # struct { # Code int // HTTP status code (see https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml) # Size int // An int representing the size of the response. # Latency float64 // A float64 representing the latency of the response in seconds. # } # # Revision: # struct { # Name string // Knative revision name # Namespace string // Knative revision namespace # Service string // Knative service name # Configuration string // Knative configuration name # PodName string // Name of the pod hosting the revision # PodIP string // IP of the pod hosting the revision # } # logging.request-log-template: '{"httpRequest": {"requestMethod": "{{.Request.Method}}", "requestUrl": "{{js .Request.RequestURI}}", "requestSize": "{{.Request.ContentLength}}", "status": {{.Response.Code}}, "responseSize": "{{.Response.Size}}", "userAgent": "{{js .Request.UserAgent}}", "remoteIp": "{{js .Request.RemoteAddr}}", "serverIp": "{{.Revision.PodIP}}", "referer": "{{js .Request.Referer}}", "latency": "{{.Response.Latency}}s", "protocol": "{{.Request.Proto}}"}, "traceId": "{{index .Request.Header "X-B3-Traceid"}}"}' - # If true, this enables queue proxy writing request logs for probe requests to stdout. # It uses the same template for user requests, i.e. logging.request-log-template. logging.enable-probe-request-log: "false" - # metrics.backend-destination field specifies the system metrics destination. # It supports either prometheus (the default) or stackdriver. # Note: Using stackdriver will incur additional charges metrics.backend-destination: prometheus - # metrics.request-metrics-backend-destination specifies the request metrics # destination. It enables queue proxy to send request metrics. # Currently supported values: prometheus (the default), stackdriver. metrics.request-metrics-backend-destination: prometheus - # metrics.stackdriver-project-id field specifies the stackdriver project ID. This # field is optional. When running on GCE, application default credentials will be # used if this field is not provided. metrics.stackdriver-project-id: "" - # metrics.allow-stackdriver-custom-metrics indicates whether it is allowed to send metrics to # Stackdriver using "global" resource type and custom metric type if the # metrics are not supported by "knative_revision" resource type. Setting this # flag to "true" could cause extra Stackdriver charge. # If metrics.backend-destination is not Stackdriver, this is ignored. metrics.allow-stackdriver-custom-metrics: "false" - # profiling.enable indicates whether it is allowed to retrieve runtime profiling data from # the pods via an HTTP server in the format expected by the pprof visualization tool. When # enabled, the Knative Serving pods expose the profiling data on an alternate HTTP port 8008. # The HTTP context root for profiling is then /debug/pprof/. profiling.enable: "false" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-observability - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-tracing.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-tracing.yaml deleted file mode 100644 index e021622e1c..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_configmap_config-tracing.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: v1 -data: - _example: | - ################################ - # # - # EXAMPLE CONFIGURATION # - # # - ################################ - - # This block is not actually functional configuration, - # but serves to illustrate the available configuration - # options and document them in a way that is accessible - # to users that `kubectl edit` this config map. - # - # These sample configuration options may be copied out of - # this example block and unindented to be in the data block - # to actually change the configuration. - # - # This may be "zipkin" or "stackdriver", the default is "none" - backend: "none" - - # URL to zipkin collector where traces are sent. - # This must be specified when backend is "zipkin" - zipkin-endpoint: "http://zipkin.istio-system.svc.cluster.local:9411/api/v2/spans" - - # The GCP project into which stackdriver metrics will be written - # when backend is "stackdriver". If unspecified, the project-id - # is read from GCP metadata when running on GCP. - stackdriver-project-id: "my-project" - - # Enable zipkin debug mode. This allows all spans to be sent to the server - # bypassing sampling. - debug: "false" - - # Percentage (0-1) of requests to trace - sample-rate: "0.1" -kind: ConfigMap -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: config-tracing - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml deleted file mode 100644 index 9e248f6aec..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_istio-webhook-certs.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: istio-webhook-certs - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_webhook-certs.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_webhook-certs.yaml deleted file mode 100644 index 51518ce817..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_secret_webhook-certs.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: webhook-certs - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_activator-service.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_activator-service.yaml deleted file mode 100644 index 5fa8f1a9e4..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_activator-service.yaml +++ /dev/null @@ -1,31 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: activator-service - namespace: knative-serving -spec: - ports: - - name: http - port: 80 - targetPort: 8012 - - name: http2 - port: 81 - targetPort: 8013 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - selector: - app: activator - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_autoscaler.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_autoscaler.yaml deleted file mode 100644 index 29483162cd..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_autoscaler.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: autoscaler - namespace: knative-serving -spec: - ports: - - name: http - port: 8080 - targetPort: 8080 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: https-custom-metrics - port: 443 - targetPort: 8443 - selector: - app: autoscaler - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_controller.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_controller.yaml deleted file mode 100644 index c4935f595a..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_controller.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: knative-serving -spec: - ports: - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: http-metrics - port: 9090 - targetPort: 9090 - selector: - app: controller - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_istio-webhook.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_istio-webhook.yaml deleted file mode 100644 index 0783cb5924..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_istio-webhook.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: istio-webhook - serving.knative.dev/release: v0.14.3 - name: istio-webhook - namespace: knative-serving -spec: - ports: - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: https-webhook - port: 443 - targetPort: 8443 - selector: - app: istio-webhook - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_webhook.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_webhook.yaml deleted file mode 100644 index 02ae714c22..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_service_webhook.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook - serving.knative.dev/release: v0.14.3 - name: webhook - namespace: knative-serving -spec: - ports: - - name: http-metrics - port: 9090 - targetPort: 9090 - - name: http-profiling - port: 8008 - targetPort: 8008 - - name: https-webhook - port: 443 - targetPort: 8443 - selector: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - role: webhook diff --git a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_serviceaccount_controller.yaml b/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_serviceaccount_controller.yaml deleted file mode 100644 index 32ae9562aa..0000000000 --- a/tests/tests/legacy_kustomizations/knative-install/test_data/expected/~g_v1_serviceaccount_controller.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: knative-serving-install - app.kubernetes.io/name: knative-serving-install - kustomize.component: knative - serving.knative.dev/release: v0.14.3 - name: controller - namespace: knative-serving diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/kustomize_test.go b/tests/tests/legacy_kustomizations/kubeflow-roles/kustomize_test.go deleted file mode 100644 index 122ffd5fee..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package kubeflow_roles - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/kubeflow-roles", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml deleted file mode 100644 index 0520bc0bc9..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-admin.yaml +++ /dev/null @@ -1,9 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: kubeflow-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml deleted file mode 100644 index 7f472eddde..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-edit.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-edit -rules: [] diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml deleted file mode 100644 index d879f2f6c8..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-admin.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-kubernetes-admin -rules: -- apiGroups: - - authorization.k8s.io - resources: - - localsubjectaccessreviews - verbs: - - create -- apiGroups: - - rbac.authorization.k8s.io - resources: - - rolebindings - - roles - verbs: - - create - - delete - - deletecollection - - get - - list - - patch - - update - - watch diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml deleted file mode 100644 index 8343f92fda..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-edit.yaml +++ /dev/null @@ -1,135 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-kubernetes-edit -rules: -- apiGroups: - - "" - resources: - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - - secrets - - services/proxy - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - impersonate -- apiGroups: - - "" - resources: - - pods - - pods/attach - - pods/exec - - pods/portforward - - pods/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - replicationcontrollers - - replicationcontrollers/scale - - secrets - - serviceaccounts - - services - - services/proxy - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - apps - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - replicasets - - replicasets/scale - - statefulsets - - statefulsets/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - batch - resources: - - cronjobs - - jobs - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - extensions - resources: - - daemonsets - - deployments - - deployments/rollback - - deployments/scale - - ingresses - - networkpolicies - - replicasets - - replicasets/scale - - replicationcontrollers/scale - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - deletecollection - - patch - - update -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - networkpolicies - verbs: - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml deleted file mode 100644 index d8a396b9de..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-kubernetes-view.yaml +++ /dev/null @@ -1,125 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-kubernetes-view -rules: -- apiGroups: - - "" - resources: - - configmaps - - endpoints - - persistentvolumeclaims - - persistentvolumeclaims/status - - pods - - replicationcontrollers - - replicationcontrollers/scale - - serviceaccounts - - services - - services/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - bindings - - events - - limitranges - - namespaces/status - - pods/log - - pods/status - - replicationcontrollers/status - - resourcequotas - - resourcequotas/status - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - apps - resources: - - controllerrevisions - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - replicasets - - replicasets/scale - - replicasets/status - - statefulsets - - statefulsets/scale - - statefulsets/status - verbs: - - get - - list - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - - horizontalpodautoscalers/status - verbs: - - get - - list - - watch -- apiGroups: - - batch - resources: - - cronjobs - - cronjobs/status - - jobs - - jobs/status - verbs: - - get - - list - - watch -- apiGroups: - - extensions - resources: - - daemonsets - - daemonsets/status - - deployments - - deployments/scale - - deployments/status - - ingresses - - ingresses/status - - networkpolicies - - replicasets - - replicasets/scale - - replicasets/status - - replicationcontrollers/scale - verbs: - - get - - list - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets - - poddisruptionbudgets/status - verbs: - - get - - list - - watch -- apiGroups: - - networking.k8s.io - resources: - - ingresses - - ingresses/status - - networkpolicies - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml b/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml deleted file mode 100644 index 5420a10679..0000000000 --- a/tests/tests/legacy_kustomizations/kubeflow-roles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-view.yaml +++ /dev/null @@ -1,11 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: kubeflow-view -rules: [] diff --git a/tests/tests/legacy_kustomizations/metacontroller/kustomize_test.go b/tests/tests/legacy_kustomizations/metacontroller/kustomize_test.go deleted file mode 100644 index 0574b9e7fb..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package metacontroller - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/metacontroller", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_compositecontrollers.metacontroller.k8s.io.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_compositecontrollers.metacontroller.k8s.io.yaml deleted file mode 100644 index de393b499c..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_compositecontrollers.metacontroller.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - kustomize.component: metacontroller - name: compositecontrollers.metacontroller.k8s.io -spec: - group: metacontroller.k8s.io - names: - kind: CompositeController - plural: compositecontrollers - shortNames: - - cc - - cctl - singular: compositecontroller - scope: Cluster - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_controllerrevisions.metacontroller.k8s.io.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_controllerrevisions.metacontroller.k8s.io.yaml deleted file mode 100644 index c91596faa8..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_controllerrevisions.metacontroller.k8s.io.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - kustomize.component: metacontroller - name: controllerrevisions.metacontroller.k8s.io -spec: - group: metacontroller.k8s.io - names: - kind: ControllerRevision - plural: controllerrevisions - singular: controllerrevision - scope: Namespaced - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_decoratorcontrollers.metacontroller.k8s.io.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_decoratorcontrollers.metacontroller.k8s.io.yaml deleted file mode 100644 index 921d33b84c..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_decoratorcontrollers.metacontroller.k8s.io.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - kustomize.component: metacontroller - name: decoratorcontrollers.metacontroller.k8s.io -spec: - group: metacontroller.k8s.io - names: - kind: DecoratorController - plural: decoratorcontrollers - shortNames: - - dec - - decorators - singular: decoratorcontroller - scope: Cluster - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apps_v1_statefulset_metacontroller.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apps_v1_statefulset_metacontroller.yaml deleted file mode 100644 index 5996633bf0..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/apps_v1_statefulset_metacontroller.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: StatefulSet -metadata: - labels: - app: metacontroller - kustomize.component: metacontroller - name: metacontroller - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: metacontroller - kustomize.component: metacontroller - serviceName: "" - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: metacontroller - kustomize.component: metacontroller - spec: - containers: - - command: - - /usr/bin/metacontroller - - --logtostderr - - -v=4 - - --discovery-interval=20s - image: metacontroller/metacontroller:v0.3.0 - imagePullPolicy: Always - name: metacontroller - ports: - - containerPort: 2345 - resources: - limits: - cpu: "4" - memory: 4Gi - requests: - cpu: 500m - memory: 1Gi - securityContext: - allowPrivilegeEscalation: true - privileged: true - serviceAccountName: meta-controller-service - volumeClaimTemplates: [] diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_meta-controller-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_meta-controller-cluster-role-binding.yaml deleted file mode 100644 index 1971a941c6..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_meta-controller-cluster-role-binding.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - kustomize.component: metacontroller - name: meta-controller-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: meta-controller-service - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/~g_v1_serviceaccount_meta-controller-service.yaml b/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/~g_v1_serviceaccount_meta-controller-service.yaml deleted file mode 100644 index 5acb480f69..0000000000 --- a/tests/tests/legacy_kustomizations/metacontroller/test_data/expected/~g_v1_serviceaccount_meta-controller-service.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - kustomize.component: metacontroller - name: meta-controller-service - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/metadata/kustomize_test.go b/tests/tests/legacy_kustomizations/metadata/kustomize_test.go deleted file mode 100644 index e4457ad61d..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package metadata - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/metadata", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml deleted file mode 100644 index 5cfc7c83ec..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/app.k8s.io_v1beta1_application_metadata.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - descriptor: - description: Tracking and managing metadata of machine learning workflows in Kubeflow. - keywords: - - metadata - links: - - description: Docs - url: https://www.kubeflow.org/docs/components/misc/metadata/ - maintainers: - - email: zhenghui@google.com - name: Zhenghui Wang - owners: - - email: ajaygopinathan@google.com - name: Ajay Gopinathan - - email: zhenghui@google.com - name: Zhenghui Wang - type: metadata - version: alpha - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml deleted file mode 100644 index b105853719..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-db.yaml +++ /dev/null @@ -1,73 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: db - kustomize.component: metadata - strategy: - type: Recreate - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: db - kustomize.component: metadata - name: db - spec: - containers: - - args: - - --datadir - - /var/lib/mysql/datadir - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - image: mysql:8.0.3 - name: db-container - ports: - - containerPort: 3306 - name: dbapi - readinessProbe: - exec: - command: - - /bin/bash - - -c - - mysql -D $$MYSQL_DATABASE -p$$MYSQL_ROOT_PASSWORD -e 'SELECT 1' - initialDelaySeconds: 5 - periodSeconds: 2 - timeoutSeconds: 1 - volumeMounts: - - mountPath: /var/lib/mysql - name: metadata-mysql - volumes: - - name: metadata-mysql - persistentVolumeClaim: - claimName: metadata-mysql diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml deleted file mode 100644 index a336a8e724..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-envoy-deployment.yaml +++ /dev/null @@ -1,48 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: envoy - kustomize.component: metadata - name: metadata-envoy-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: envoy - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: envoy - kustomize.component: metadata - spec: - containers: - - image: gcr.io/ml-pipeline/envoy:metadata-grpc - name: container - ports: - - containerPort: 9090 - name: md-envoy - - containerPort: 9901 - name: envoy-admin diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml deleted file mode 100644 index 2ea6430f39..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/apps_v1_deployment_metadata-grpc-deployment.yaml +++ /dev/null @@ -1,62 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: grpc-server - kustomize.component: metadata - name: metadata-grpc-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: grpc-server - kustomize.component: metadata - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: grpc-server - kustomize.component: metadata - spec: - containers: - - args: - - --grpc_port=$(METADATA_GRPC_SERVICE_PORT) - - --mysql_config_host=metadata-db - - --mysql_config_database=$(MYSQL_DATABASE) - - --mysql_config_port=$(MYSQL_PORT) - - --mysql_config_user=$(MYSQL_USER_NAME) - - --mysql_config_password=$(MYSQL_ROOT_PASSWORD) - command: - - /bin/metadata_store_server - envFrom: - - configMapRef: - name: metadata-db-parameters - - secretRef: - name: metadata-db-secrets - - configMapRef: - name: metadata-grpc-configmap - image: gcr.io/tfx-oss-public/ml_metadata_store_server:v0.21.1 - name: container - ports: - - containerPort: 8080 - name: grpc-backendapi diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml deleted file mode 100644 index 7e6b513caa..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/networking.istio.io_v1alpha3_virtualservice_metadata-grpc.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-grpc - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /ml_metadata - rewrite: - uri: /ml_metadata - route: - - destination: - host: metadata-envoy-service.kubeflow.svc.cluster.local - port: - number: 9090 - timeout: 300s diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml deleted file mode 100644 index d7f92e5f65..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-grpc-configmap.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - METADATA_GRPC_SERVICE_HOST: metadata-grpc-service - METADATA_GRPC_SERVICE_PORT: "8080" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-grpc-configmap - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml deleted file mode 100644 index 50253e0723..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_configmap_metadata-ui-parameters.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-ui-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml deleted file mode 100644 index 3360ee8ac9..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_persistentvolumeclaim_metadata-mysql.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-mysql - namespace: kubeflow -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 10Gi diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-db.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-db.yaml deleted file mode 100644 index fca3217043..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-db.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: db - kustomize.component: metadata - name: metadata-db - namespace: kubeflow -spec: - ports: - - name: dbapi - port: 3306 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: db - kustomize.component: metadata - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml deleted file mode 100644 index bcc1699635..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-envoy-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-envoy-service - namespace: kubeflow -spec: - ports: - - name: md-envoy - port: 9090 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: envoy - kustomize.component: metadata - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml b/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml deleted file mode 100644 index 8a05d6c651..0000000000 --- a/tests/tests/legacy_kustomizations/metadata/test_data/expected/~g_v1_service_metadata-grpc-service.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: grpc-metadata - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - kustomize.component: metadata - name: metadata-grpc-service - namespace: kubeflow -spec: - ports: - - name: grpc-backendapi - port: 8080 - protocol: TCP - selector: - app.kubernetes.io/component: metadata - app.kubernetes.io/instance: metadata-0.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: metadata - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.1 - component: grpc-server - kustomize.component: metadata - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/notebook-controller/kustomize_test.go b/tests/tests/legacy_kustomizations/notebook-controller/kustomize_test.go deleted file mode 100644 index 9152b0fa21..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package notebook_controller - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/notebook-controller", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml deleted file mode 100644 index a849f3165d..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_notebooks.kubeflow.org.yaml +++ /dev/null @@ -1,100 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebooks.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Notebook - plural: notebooks - singular: notebook - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - properties: - template: - description: 'INSERT ADDITIONAL SPEC FIELDS - desired state of cluster - Important: Run "make" to regenerate code after modifying this file' - properties: - spec: - properties: - containers: - items: - properties: - resources: - properties: - limits: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - requests: - properties: - cpu: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - memory: - pattern: ^([+-]?[0-9.]+)([eEinumkKMGTP]*[-+]?[0-9]*)$ - type: string - type: object - type: object - type: object - type: array - type: object - type: object - type: object - status: - properties: - conditions: - description: Conditions is an array of current conditions - items: - properties: - type: - description: Type of the confition/ - type: string - required: - - type - type: object - type: array - required: - - conditions - type: object - versions: - - name: v1alpha1 - served: true - storage: false - - name: v1beta1 - served: true - storage: true - - name: v1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml deleted file mode 100644 index 05011bb11d..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/app.k8s.io_v1beta1_application_notebook-controller.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: notebook-controller - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: Notebooks controller allows users to create a custom resource \"Notebook\" - (jupyter notebook). - keywords: - - jupyter - - notebook - - notebook-controller - - jupyterhub - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/notebook-controller - maintainers: - - email: lunkai@google.com - name: Lun-kai Hsu - owners: - - email: lunkai@gogle.com - name: Lun-kai Hsu - type: notebook-controller - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/name: notebook-controller diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml deleted file mode 100644 index 6074cadaf0..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/apps_v1_deployment_notebook-controller-deployment.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - spec: - containers: - - command: - - /manager - env: - - name: USE_ISTIO - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - image: gcr.io/kubeflow-images-public/notebook-controller:vmaster-g6eb007d0 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - serviceAccountName: notebook-controller-service-account diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml deleted file mode 100644 index 9d16cdeae0..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-admin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: notebook-controller-kubeflow-notebooks-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml deleted file mode 100644 index af3ddf0156..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-edit.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-notebooks-admin: "true" - name: notebook-controller-kubeflow-notebooks-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml deleted file mode 100644 index 494d9f3768..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-kubeflow-notebooks-view.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: notebook-controller-kubeflow-notebooks-view -rules: -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml deleted file mode 100644 index 3fa1993956..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_notebook-controller-role.yaml +++ /dev/null @@ -1,58 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-role -rules: -- apiGroups: - - apps - resources: - - statefulsets - - deployments - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - '*' -- apiGroups: - - "" - resources: - - events - verbs: - - get - - list - - watch - - create -- apiGroups: - - kubeflow.org - resources: - - notebooks - - notebooks/status - - notebooks/finalizers - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml deleted file mode 100644 index 68874191ef..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_notebook-controller-role-binding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: notebook-controller-role -subjects: -- kind: ServiceAccount - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-parameters.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-parameters.yaml deleted file mode 100644 index 20974cf072..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_configmap_notebook-controller-parameters.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -data: - ISTIO_GATEWAY: kubeflow/kubeflow-gateway - POD_LABELS: gcp-cred-secret=user-gcp-sa,gcp-cred-secret-filename=user-gcp-sa.json - USE_ISTIO: "false" -kind: ConfigMap -metadata: - annotations: {} - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml deleted file mode 100644 index 7e47bc3ebf..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_service_notebook-controller-service.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-service - namespace: kubeflow -spec: - ports: - - port: 443 - selector: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller diff --git a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml b/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml deleted file mode 100644 index 6f534aa3ad..0000000000 --- a/tests/tests/legacy_kustomizations/notebook-controller/test_data/expected/~g_v1_serviceaccount_notebook-controller-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: notebook-controller - app.kubernetes.io/component: notebook-controller - app.kubernetes.io/instance: notebook-controller-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: notebook-controller - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: notebook-controller - name: notebook-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/persistent-agent/kustomize_test.go b/tests/tests/legacy_kustomizations/persistent-agent/kustomize_test.go deleted file mode 100644 index 1f303ecae3..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package persistent_agent - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/persistent-agent", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/app.k8s.io_v1beta1_application_persistent-agent.yaml b/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/app.k8s.io_v1beta1_application_persistent-agent.yaml deleted file mode 100644 index e3de303627..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/app.k8s.io_v1beta1_application_persistent-agent.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: persistent-agent - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - persistent-agent - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: persistent-agent - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml b/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index bd0145b0db..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/apps_v1_deployment_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-persistenceagent - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/persistenceagent:0.2.5 - imagePullPolicy: IfNotPresent - name: ml-pipeline-persistenceagent - serviceAccountName: ml-pipeline-persistenceagent diff --git a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-persistenceagent.yaml b/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index cfdec764c0..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-persistenceagent -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-persistenceagent.yaml b/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index 04c2db4ad0..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-persistenceagent -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-persistenceagent -subjects: -- kind: ServiceAccount - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml b/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml deleted file mode 100644 index e663d82470..0000000000 --- a/tests/tests/legacy_kustomizations/persistent-agent/test_data/expected/~g_v1_serviceaccount_ml-pipeline-persistenceagent.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: ml-pipeline-persistenceagent - app.kubernetes.io/component: persistent-agent - app.kubernetes.io/instance: persistent-agent-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: persistent-agent - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-persistenceagent - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipeline-visualization-service/kustomize_test.go b/tests/tests/legacy_kustomizations/pipeline-visualization-service/kustomize_test.go deleted file mode 100644 index 852ee6c930..0000000000 --- a/tests/tests/legacy_kustomizations/pipeline-visualization-service/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pipeline_visualization_service - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pipeline-visualization-service", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/app.k8s.io_v1beta1_application_pipeline-visualization-service.yaml b/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/app.k8s.io_v1beta1_application_pipeline-visualization-service.yaml deleted file mode 100644 index a70981a936..0000000000 --- a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/app.k8s.io_v1beta1_application_pipeline-visualization-service.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipeline-visualization-service - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - pipeline-visualization-service - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: pipeline-visualization-service - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml b/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index fe0c50dad7..0000000000 --- a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/apps_v1_deployment_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - image: gcr.io/ml-pipeline/visualization-server:0.2.5 - imagePullPolicy: IfNotPresent - name: ml-pipeline-visualizationserver - ports: - - containerPort: 8888 diff --git a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml b/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml deleted file mode 100644 index cda793aba8..0000000000 --- a/tests/tests/legacy_kustomizations/pipeline-visualization-service/test_data/expected/~g_v1_service_ml-pipeline-visualizationserver.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-visualizationserver - namespace: kubeflow -spec: - ports: - - name: http - port: 8888 - protocol: TCP - targetPort: 8888 - selector: - app: ml-pipeline-visualizationserver - app.kubernetes.io/component: pipeline-visualization-service - app.kubernetes.io/instance: pipeline-visualization-service-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipeline-visualization-service - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 diff --git a/tests/tests/legacy_kustomizations/pipelines-runner/kustomize_test.go b/tests/tests/legacy_kustomizations/pipelines-runner/kustomize_test.go deleted file mode 100644 index 19ef31886b..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-runner/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pipelines_runner - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pipelines-runner", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/app.k8s.io_v1beta1_application_pipelines-runner.yaml b/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/app.k8s.io_v1beta1_application_pipelines-runner.yaml deleted file mode 100644 index 9431f5f4e9..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/app.k8s.io_v1beta1_application_pipelines-runner.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipelines-runner - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - pipelines-runner - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: pipelines-runner - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pipeline-runner.yaml b/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pipeline-runner.yaml deleted file mode 100644 index 2cc56a5b67..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pipeline-runner.yaml +++ /dev/null @@ -1,101 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pipeline-runner - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipeline-runner -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - watch - - list -- apiGroups: - - "" - resources: - - persistentvolumes - - persistentvolumeclaims - verbs: - - '*' -- apiGroups: - - snapshot.storage.k8s.io - resources: - - volumesnapshots - verbs: - - create - - delete - - get -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - get - - list - - watch - - update - - patch -- apiGroups: - - "" - resources: - - pods - - pods/exec - - pods/log - - services - verbs: - - '*' -- apiGroups: - - "" - - apps - - extensions - resources: - - deployments - - replicasets - verbs: - - '*' -- apiGroups: - - kubeflow.org - - serving.kubeflow.org - resources: - - '*' - verbs: - - '*' -- apiGroups: - - batch - resources: - - jobs - verbs: - - '*' -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - '*' -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - '*' -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pipeline-runner.yaml b/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pipeline-runner.yaml deleted file mode 100644 index 3ea782ea11..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pipeline-runner.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pipeline-runner - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipeline-runner -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pipeline-runner -subjects: -- kind: ServiceAccount - name: pipeline-runner - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml b/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml deleted file mode 100644 index a0a890d155..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-runner/test_data/expected/~g_v1_serviceaccount_pipeline-runner.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pipeline-runner - app.kubernetes.io/component: pipelines-runner - app.kubernetes.io/instance: pipelines-runner-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-runner - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipeline-runner - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/kustomize_test.go b/tests/tests/legacy_kustomizations/pipelines-ui/kustomize_test.go deleted file mode 100644 index 80039e6f06..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pipelines_ui - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pipelines-ui", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/app.k8s.io_v1beta1_application_pipelines-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/app.k8s.io_v1beta1_application_pipelines-ui.yaml deleted file mode 100644 index 44373b0b63..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/app.k8s.io_v1beta1_application_pipelines-ui.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipelines-ui - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - pipelines-ui - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: pipelines-ui - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml deleted file mode 100644 index 3692501818..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/apps_v1_deployment_ml-pipeline-ui.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - env: - - name: GOOGLE_APPLICATION_CREDENTIALS - value: /etc/credentials/user-gcp-sa.json - - name: VIEWER_TENSORBOARD_POD_TEMPLATE_SPEC_PATH - value: /etc/config/viewer-pod-template.json - - name: ALLOW_CUSTOM_VISUALIZATIONS - value: "true" - image: gcr.io/ml-pipeline/frontend:0.2.5 - imagePullPolicy: IfNotPresent - name: ml-pipeline-ui - ports: - - containerPort: 3000 - volumeMounts: - - mountPath: /etc/credentials - name: gcp-sa-token - readOnly: true - - mountPath: /etc/config - name: config-volume - readOnly: true - serviceAccountName: ml-pipeline-ui - volumes: - - name: gcp-sa-token - secret: - secretName: user-gcp-sa - - configMap: - name: ml-pipeline-ui-configmap - name: config-volume diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-tensorboard-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-tensorboard-ui.yaml deleted file mode 100644 index f62738a7f1..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-tensorboard-ui.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-tensorboard-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /data - rewrite: - uri: /data - route: - - destination: - host: ml-pipeline-tensorboard-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml deleted file mode 100644 index 68ad446483..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/networking.istio.io_v1alpha3_virtualservice_ml-pipeline-ui.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - match: - - uri: - prefix: /pipeline - rewrite: - uri: /pipeline - route: - - destination: - host: ml-pipeline-ui.kubeflow.svc.cluster.local - port: - number: 80 - timeout: 300s diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-ui.yaml deleted file mode 100644 index 1567147417..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-ui.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - - pods/log - verbs: - - create - - get - - list -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - delete diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline-ui.yaml deleted file mode 100644 index 324a6a746e..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/rbac.authorization.k8s.io_v1beta1_rolebinding_ml-pipeline-ui.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: RoleBinding -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: ml-pipeline-ui -subjects: -- kind: ServiceAccount - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_configmap_ui-parameters-hb792fcf5d.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_configmap_ui-parameters-hb792fcf5d.yaml deleted file mode 100644 index 3679671270..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_configmap_ui-parameters-hb792fcf5d.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -data: - uiClusterDomain: cluster.local -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ui-parameters-hb792fcf5d - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-tensorboard-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-tensorboard-ui.yaml deleted file mode 100644 index 9f3281e1cc..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-tensorboard-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-tensorboard-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-tensorboard-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 3000 - selector: - app: ml-pipeline-tensorboard-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml deleted file mode 100644 index 3ffb3d37fd..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_service_ml-pipeline-ui.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow -spec: - ports: - - port: 80 - targetPort: 3000 - selector: - app: ml-pipeline-ui - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 diff --git a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml b/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml deleted file mode 100644 index a53b6e5aa3..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-ui/test_data/expected/~g_v1_serviceaccount_ml-pipeline-ui.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: pipelines-ui - app.kubernetes.io/instance: pipelines-ui-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-ui - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-ui - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/kustomize_test.go b/tests/tests/legacy_kustomizations/pipelines-viewer/kustomize_test.go deleted file mode 100644 index f658df01f9..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pipelines_viewer - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pipelines-viewer", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml deleted file mode 100644 index e76e0755dd..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_viewers.kubeflow.org.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: viewers.kubeflow.org -spec: - group: kubeflow.org - names: - kind: Viewer - listKind: ViewerList - plural: viewers - shortNames: - - vi - singular: viewer - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/app.k8s.io_v1beta1_application_pipelines-viewer.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/app.k8s.io_v1beta1_application_pipelines-viewer.yaml deleted file mode 100644 index dc3caf19ef..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/app.k8s.io_v1beta1_application_pipelines-viewer.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: pipelines-viewer - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - pipelines-viewer - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: pipelines-viewer - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-controller-deployment.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-controller-deployment.yaml deleted file mode 100644 index c625a0dc66..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/apps_v1_deployment_ml-pipeline-viewer-controller-deployment.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-viewer-controller-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/viewer-crd-controller:0.2.5 - imagePullPolicy: Always - name: ml-pipeline-viewer-controller - serviceAccountName: ml-pipeline-viewer-crd-service-account diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-admin.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-admin.yaml deleted file mode 100644 index f657ebd1d0..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-admin.yaml +++ /dev/null @@ -1,18 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pipeline-viewers-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: ml-pipeline-viewer-kubeflow-pipeline-viewers-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-edit.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-edit.yaml deleted file mode 100644 index ef9a93638d..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-edit.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pipeline-viewers-admin: "true" - name: ml-pipeline-viewer-kubeflow-pipeline-viewers-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-view.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-view.yaml deleted file mode 100644 index 4725407557..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_ml-pipeline-viewer-kubeflow-pipeline-viewers-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: ml-pipeline-viewer-kubeflow-pipeline-viewers-view -rules: -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-viewer-controller-role.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-viewer-controller-role.yaml deleted file mode 100644 index d232deba05..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_ml-pipeline-viewer-controller-role.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-viewer-controller-role -rules: -- apiGroups: - - '*' - resources: - - deployments - - services - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - viewers - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-viewer-crd-role-binding.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-viewer-crd-role-binding.yaml deleted file mode 100644 index ebf04edbf2..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-viewer-crd-role-binding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-viewer-crd-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: ml-pipeline-viewer-controller-role -subjects: -- kind: ServiceAccount - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml b/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml deleted file mode 100644 index 7d4463a60c..0000000000 --- a/tests/tests/legacy_kustomizations/pipelines-viewer/test_data/expected/~g_v1_serviceaccount_ml-pipeline-viewer-crd-service-account.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: ml-pipeline-viewer-crd - app.kubernetes.io/component: pipelines-viewer - app.kubernetes.io/instance: pipelines-viewer-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pipelines-viewer - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-viewer-crd-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/profiles/kustomize_test.go b/tests/tests/legacy_kustomizations/profiles/kustomize_test.go deleted file mode 100644 index 0470f4045e..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package profiles - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/profiles", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml deleted file mode 100644 index cf896b78a5..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_profiles.kubeflow.org.yaml +++ /dev/null @@ -1,164 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - creationTimestamp: null - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles.kubeflow.org -spec: - conversion: - strategy: None - group: kubeflow.org - names: - kind: Profile - plural: profiles - scope: Cluster - subresources: - status: {} - validation: - openAPIV3Schema: - description: Profile is the Schema for the profiles API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: ProfileSpec defines the desired state of Profile - properties: - owner: - description: The profile owner - properties: - apiGroup: - description: APIGroup holds the API group of the referenced subject. - Defaults to "" for ServiceAccount subjects. Defaults to "rbac.authorization.k8s.io" - for User and Group subjects. - type: string - kind: - description: Kind of object being referenced. Values defined by - this API group are "User", "Group", and "ServiceAccount". If the - Authorizer does not recognized the kind value, the Authorizer - should report an error. - type: string - name: - description: Name of the object being referenced. - type: string - required: - - kind - - name - type: object - plugins: - items: - description: Plugin is for customize actions on different platform. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this - representation of an object. Servers should convert recognized - schemas to the latest internal value, and may reject unrecognized - values. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource - this object represents. Servers may infer this from the endpoint - the client submits requests to. Cannot be updated. In CamelCase. - More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds' - type: string - spec: - type: object - type: object - type: array - resourceQuotaSpec: - description: Resourcequota that will be applied to target namespace - properties: - hard: - additionalProperties: - type: string - description: 'hard is the set of desired hard limits for each named - resource. More info: https://kubernetes.io/docs/concepts/policy/resource-quotas/' - type: object - scopeSelector: - description: scopeSelector is also a collection of filters like - scopes that must match each object tracked by a quota but expressed - using ScopeSelectorOperator in combination with possible values. - For a resource to match, both scopes AND scopeSelector (if specified - in spec), must be matched. - properties: - matchExpressions: - description: A list of scope selector requirements by scope - of the resources. - items: - description: A scoped-resource selector requirement is a selector - that contains values, a scope name, and an operator that - relates the scope name and values. - properties: - operator: - description: Represents a scope's relationship to a set - of values. Valid operators are In, NotIn, Exists, DoesNotExist. - type: string - scopeName: - description: The name of the scope that the selector applies - to. - type: string - values: - description: An array of string values. If the operator - is In or NotIn, the values array must be non-empty. - If the operator is Exists or DoesNotExist, the values - array must be empty. This array is replaced during a - strategic merge patch. - items: - type: string - type: array - required: - - operator - - scopeName - type: object - type: array - type: object - scopes: - description: A collection of filters that must match each object - tracked by a quota. If not specified, the quota matches all objects. - items: - description: A ResourceQuotaScope defines a filter that must match - each object tracked by a quota - type: string - type: array - type: object - type: object - status: - description: ProfileStatus defines the observed state of Profile - properties: - conditions: - items: - properties: - message: - type: string - status: - type: string - type: - type: string - type: object - type: array - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1beta1 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml deleted file mode 100644 index 1eb2162de2..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/app.k8s.io_v1beta1_application_profiles.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: profiles - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: Service - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - profiles - - kubeflow - links: - - description: profiles - url: https://github.com/kubeflow/kubeflow/tree/master/components/profile-controller - - description: kfam - url: https://github.com/kubeflow/kubeflow/tree/master/components/access-management - maintainers: - - email: kunming@google.com - name: Kunming Qu - owners: - - email: kunming@google.com - name: Kunming Qu - type: profiles - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/name: profiles diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml deleted file mode 100644 index e30ca0e807..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/apps_v1_deployment_profiles-deployment.yaml +++ /dev/null @@ -1,83 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles-deployment - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - spec: - containers: - - args: - - -userid-header - - X-Goog-Authenticated-User-Email - - -userid-prefix - - 'accounts.google.com:' - - -workload-identity - - kf-v1-0210-user@jlewi-dev.iam.gserviceaccount.com - command: - - /manager - image: gcr.io/kubeflow-images-public/profile-controller:vmaster-ga49f658f - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8080 - initialDelaySeconds: 30 - periodSeconds: 30 - name: manager - ports: - - containerPort: 8080 - name: manager-http - protocol: TCP - - args: - - -cluster-admin - - jlewi@google.com - - -userid-header - - X-Goog-Authenticated-User-Email - - -userid-prefix - - 'accounts.google.com:' - command: - - /access-management - image: gcr.io/kubeflow-images-public/kfam:vmaster-g9f3bfd00 - imagePullPolicy: Always - livenessProbe: - httpGet: - path: /metrics - port: 8081 - initialDelaySeconds: 30 - periodSeconds: 30 - name: kfam - ports: - - containerPort: 8081 - name: kfam-http - protocol: TCP - serviceAccountName: profiles-controller-service-account diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml deleted file mode 100644 index 24c104baca..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/networking.istio.io_v1alpha3_virtualservice_kfam.yaml +++ /dev/null @@ -1,32 +0,0 @@ -apiVersion: networking.istio.io/v1alpha3 -kind: VirtualService -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: kfam - namespace: kubeflow -spec: - gateways: - - kubeflow-gateway - hosts: - - '*' - http: - - headers: - request: - add: - x-forwarded-prefix: /kfam - match: - - uri: - prefix: /kfam/ - rewrite: - uri: /kfam/ - route: - - destination: - host: profiles-kfam.kubeflow.svc.cluster.local - port: - number: 8081 diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml deleted file mode 100644 index c4dad473eb..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_profiles-cluster-role-binding.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-parameters-c529d7fg88.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-parameters-c529d7fg88.yaml deleted file mode 100644 index 2077249179..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_configmap_profiles-profiles-parameters-c529d7fg88.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -data: - admin: jlewi@google.com - gcp-sa: kf-v1-0210-user@jlewi-dev.iam.gserviceaccount.com - userid-header: X-Goog-Authenticated-User-Email - userid-prefix: 'accounts.google.com:' -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles-profiles-parameters-c529d7fg88 - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml deleted file mode 100644 index c46840fc03..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_service_profiles-kfam.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles-kfam - namespace: kubeflow -spec: - ports: - - port: 8081 - selector: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles diff --git a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml b/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml deleted file mode 100644 index 9b1d799aef..0000000000 --- a/tests/tests/legacy_kustomizations/profiles/test_data/expected/~g_v1_serviceaccount_profiles-controller-service-account.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: profiles - app.kubernetes.io/instance: profiles-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: profiles - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: profiles - name: profiles-controller-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pytorch-job-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/pytorch-job-crds/kustomize_test.go deleted file mode 100644 index bca750136b..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-job-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pytorch_job_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pytorch-job-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml deleted file mode 100644 index 8bc3eaecca..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_pytorchjobs.kubeflow.org.yaml +++ /dev/null @@ -1,49 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: pytorchjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: PyTorchJob - plural: pytorchjobs - singular: pytorchjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - pytorchReplicaSpecs: - properties: - Master: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml b/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml deleted file mode 100644 index b2cdfa85d8..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-job-crds/test_data/expected/app.k8s.io_v1beta1_application_pytorch-job-crds.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: pytorch-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-job-crds contains the "PyTorchJob" custom resource definition. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/kustomize_test.go b/tests/tests/legacy_kustomizations/pytorch-operator/kustomize_test.go deleted file mode 100644 index 1cea9ecef8..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package pytorch_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/pytorch-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml deleted file mode 100644 index 60ad2eba16..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/app.k8s.io_v1beta1_application_pytorch-operator.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: pytorch-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: PyTorchJob - descriptor: - description: Pytorch-operator allows users to create and manage the "PyTorchJob" - custom resource. - keywords: - - pytorchjob - - pytorch-operator - - pytorch-training - links: - - description: About - url: https://github.com/kubeflow/pytorch-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/pytorchjob/v1/pytorch/ - maintainers: - - email: johnugeo@cisco.com - name: Johnu George - owners: - - email: johnugeo@cisco.com - name: Johnu George - type: pytorch-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/apps_v1_deployment_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/apps_v1_deployment_pytorch-operator.yaml deleted file mode 100644 index a4f36fbf16..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/apps_v1_deployment_pytorch-operator.yaml +++ /dev/null @@ -1,57 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - spec: - containers: - - command: - - /pytorch-operator.v1 - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/pytorch-operator:vmaster-g518f9c76 - name: pytorch-operator - serviceAccountName: pytorch-operator diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml deleted file mode 100644 index ea2c65a524..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-admin.yaml +++ /dev/null @@ -1,18 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-pytorchjobs-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml deleted file mode 100644 index 44a5d700d0..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-edit.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-pytorchjobs-admin: "true" - name: kubeflow-pytorchjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml deleted file mode 100644 index 2897f91381..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-pytorchjobs-view.yaml +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-pytorchjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml deleted file mode 100644 index 1dc780b0eb..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_pytorch-operator.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - pytorchjobs - - pytorchjobs/status - - pytorchjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml deleted file mode 100644 index 507fbb7c7b..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_pytorch-operator.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: pytorch-operator -subjects: -- kind: ServiceAccount - name: pytorch-operator - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_service_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_service_pytorch-operator.yaml deleted file mode 100644 index 0fddb0c120..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_service_pytorch-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml b/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml deleted file mode 100644 index 575375c57d..0000000000 --- a/tests/tests/legacy_kustomizations/pytorch-operator/test_data/expected/~g_v1_serviceaccount_pytorch-operator.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: pytorch-operator - app.kubernetes.io/component: pytorch - app.kubernetes.io/instance: pytorch-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: pytorch-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: pytorch-operator - name: pytorch-operator - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/kustomize_test.go b/tests/tests/legacy_kustomizations/scheduledworkflow/kustomize_test.go deleted file mode 100644 index e546d33576..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package scheduledworkflow - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/scheduledworkflow", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml deleted file mode 100644 index 9349da4999..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledworkflows.kubeflow.org.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: scheduledworkflows.kubeflow.org -spec: - group: kubeflow.org - names: - kind: ScheduledWorkflow - listKind: ScheduledWorkflowList - plural: scheduledworkflows - shortNames: - - swf - singular: scheduledworkflow - scope: Namespaced - versions: - - name: v1beta1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/app.k8s.io_v1beta1_application_scheduledworkflow.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/app.k8s.io_v1beta1_application_scheduledworkflow.yaml deleted file mode 100644 index 09fb57ba7e..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/app.k8s.io_v1beta1_application_scheduledworkflow.yaml +++ /dev/null @@ -1,39 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: scheduledworkflow - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - descriptor: - description: "" - keywords: - - scheduledworkflow - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: scheduledworkflow - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.5 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.5 diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 82f9149adb..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/apps_v1_deployment_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -spec: - selector: - matchLabels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - spec: - containers: - - env: - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - image: gcr.io/ml-pipeline/scheduledworkflow:0.2.5 - imagePullPolicy: IfNotPresent - name: ml-pipeline-scheduledworkflow - serviceAccountName: ml-pipeline-scheduledworkflow diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-admin.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-admin.yaml deleted file mode 100644 index 6109d2579a..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-admin.yaml +++ /dev/null @@ -1,18 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-scheduledworkflows-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-scheduledworkflows-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-edit.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-edit.yaml deleted file mode 100644 index 80fc353202..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-edit.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-scheduledworkflows-admin: "true" - name: kubeflow-scheduledworkflows-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-view.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-view.yaml deleted file mode 100644 index dabb3cac53..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-scheduledworkflows-view.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-scheduledworkflows-view -rules: -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-scheduledworkflow.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 7f4a64a854..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-scheduledworkflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: cluster-admin -subjects: -- kind: ServiceAccount - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-scheduledworkflow.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index d7a3733e70..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/rbac.authorization.k8s.io_v1beta1_role_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: Role -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-scheduledworkflow - namespace: kubeflow -rules: -- apiGroups: - - argoproj.io - resources: - - workflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete -- apiGroups: - - kubeflow.org - resources: - - scheduledworkflows - verbs: - - create - - get - - list - - watch - - update - - patch - - delete diff --git a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml b/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml deleted file mode 100644 index 1c6ce98256..0000000000 --- a/tests/tests/legacy_kustomizations/scheduledworkflow/test_data/expected/~g_v1_serviceaccount_ml-pipeline-scheduledworkflow.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: ml-pipeline-scheduledworkflow - app.kubernetes.io/component: scheduledworkflow - app.kubernetes.io/instance: scheduledworkflow-0.2.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: scheduledworkflow - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 0.2.0 - name: ml-pipeline-scheduledworkflow - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/kustomize_test.go b/tests/tests/legacy_kustomizations/seldon-core-operator/kustomize_test.go deleted file mode 100644 index 17a40c86cf..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package seldon_core_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/seldon-core-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index d9a6ce6566..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_seldon-mutating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-mutating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCRENDQWV5Z0F3SUJBZ0lRQlFoNHlIVUVlclgrbW03d0hMMjZGakFOQmdrcWhraUc5dzBCQVFzRkFEQWMKTVJvd0dBWURWUVFERXhGamRYTjBiMjB0YldWMGNtbGpjeTFqWVRBZUZ3MHlNREV4TWpBd09URTJNalphRncweQpNVEV4TWpBd09URTJNalphTUJ3eEdqQVlCZ05WQkFNVEVXTjFjM1J2YlMxdFpYUnlhV056TFdOaE1JSUJJakFOCkJna3Foa2lHOXcwQkFRRUZBQU9DQVE4QU1JSUJDZ0tDQVFFQXZBZHltaUNxZGdCaW5LQy93QzhPTmx1YVRPckoKNVJtaGFUVmxOQzRQU1VaVnQ0cU9FMTNMZlg2Y3RObXR3MURaaldXeCtsUk52ak9PVjRueHc2NGFvc004RFFVQwoyZUdlb2wxaTR2VnZPeVMyZVM0bHdaMktET1V4djErTkV5NG5RQmdMVFRySERLcWdYbWJVNm13MXhlWEdmSm1rCkhIbVl6ZVdITnRCUjN0WllOU2laUXQ3Yk4zbDlsa21DZkEybGZPeVd3bGJBUldqNkUzWVVnSEs1Q1F6YkxOSjAKdlNoS1gwREpuLzFIMG82b09sbDhsY3BiUXQ5dWV1eG8zaCtkNTN4aUVlczUvdkZzWWVNM20xNTMrY3dmbFQrSAp2RzZKNW9ONjNUMVd5S01vYkQyU0dCSzM0OWM4czVlRFhIOVR6YlRDV1BTODA1aDZidWZZYXo2czN3SURBUUFCCm8wSXdRREFPQmdOVkhROEJBZjhFQkFNQ0FxUXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0VHQ0NzR0FRVUYKQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFKZUVjMThnNFdhTQoyb0paYy9iUC8vK3VTVXExa3ZiWWh1Wk1HRFRBdGs5amV4dW1WclRsUndoc3NvWXdDV0krTnBod2hsZHgyeDhRCmthZnA3T3EvNWFoMmRpQWxZR3ZLSnFqQWxCWVRxcW9QSGE2WXNQa0dIS3AzVFllcGNlSW1McXV4dXhtR21DVW4Kd1BhMzVqemNlSkllcUsza0RocUJ6UHFSc0daczRmeTJPK0xBMmp5UnRDK2JEVHdOdDN5R05XZXg2UXNjOXh1QgpOeFAwU1FXTFFyc2dHcUFWWWFwUVpZVG81R0lmR2dYM2NPVUhMZEs3Nk9TdURhZ2VwY0t1Z01mWFB4S3h5Y254CmU2RHk2bEV4SE1WM21mcjRHSGRvS2N2NzhSeGRFRHRxS290bWZUL0s2YkZDVU0yaDRMbTFuODhFeklaenRzbXcKbjIrWjE3L2hFWk09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K - service: - name: seldon-webhook-service - namespace: kubeflow - path: /mutate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.mseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml deleted file mode 100644 index c5a115a30b..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/admissionregistration.k8s.io_v1beta1_validatingwebhookconfiguration_seldon-validating-webhook-configuration-kubeflow.yaml +++ /dev/null @@ -1,88 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: ValidatingWebhookConfiguration -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-validating-webhook-configuration-kubeflow -webhooks: -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1-seldondeployment - failurePolicy: Fail - name: v1.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha2-seldondeployment - failurePolicy: Fail - name: v1alpha2.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha2 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments -- clientConfig: - caBundle: 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 - service: - name: seldon-webhook-service - namespace: kubeflow - path: /validate-machinelearning-seldon-io-v1alpha3-seldondeployment - failurePolicy: Fail - name: v1alpha3.vseldondeployment.kb.io - namespaceSelector: - matchExpressions: - - key: seldon.io/controller-id - operator: DoesNotExist - matchLabels: - serving.kubeflow.org/inferenceservice: enabled - rules: - - apiGroups: - - machinelearning.seldon.io - apiVersions: - - v1alpha3 - operations: - - CREATE - - UPDATE - resources: - - seldondeployments diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml deleted file mode 100644 index 57bd5d5b15..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_seldondeployments.machinelearning.seldon.io.yaml +++ /dev/null @@ -1,7198 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - annotations: - cert-manager.io/inject-ca-from: kubeflow/seldon-serving-cert - controller-gen.kubebuilder.io/version: v0.2.5 - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldondeployments.machinelearning.seldon.io -spec: - group: machinelearning.seldon.io - names: - kind: SeldonDeployment - listKind: SeldonDeploymentList - plural: seldondeployments - shortNames: - - sdep - singular: seldondeployment - scope: Namespaced - subresources: - scale: - specReplicasPath: .spec.replicas - statusReplicasPath: .status.replicas - status: {} - validation: - openAPIV3Schema: - description: SeldonDeployment is the Schema for the seldondeployments API - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: SeldonDeploymentSpec defines the desired state of SeldonDeployment - properties: - annotations: - additionalProperties: - type: string - type: object - name: - description: Name is Deprecated will be removed in future - type: string - oauth_key: - type: string - oauth_secret: - type: string - predictors: - items: - properties: - annotations: - additionalProperties: - type: string - type: object - componentSpecs: - items: - properties: - hpaSpec: - properties: - maxReplicas: - format: int32 - type: integer - metrics: - items: - description: MetricSpec specifies how to scale based - on a single metric (only `type` and one other matching - field should be set at once). - properties: - external: - description: external refers to a global metric - that is not associated with any Kubernetes object. - It allows autoscaling based on information coming - from components running outside of cluster (for - example length of queue in cloud messaging service, - or QPS from loadbalancer running outside of - cluster). - properties: - metricName: - description: metricName is the name of the - metric in question. - type: string - metricSelector: - description: metricSelector is used to identify - a specific time series within a given metric. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - per-pod value of global metric (as a quantity). - Mutually exclusive with TargetValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). Mutually - exclusive with TargetAverageValue. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - type: object - object: - description: object refers to a metric describing - a single kubernetes object (for example, hits-per-second - on an Ingress object). - properties: - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target value - of the average of the metric across all - relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - metricName: - description: metricName is the name of the - metric in question. - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - target: - description: target is the described Kubernetes - object. - properties: - apiVersion: - description: API version of the referent - type: string - kind: - description: 'Kind of the referent; More - info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds"' - type: string - name: - description: 'Name of the referent; More - info: http://kubernetes.io/docs/user-guide/identifiers#names' - type: string - required: - - kind - - name - type: object - targetValue: - anyOf: - - type: integer - - type: string - description: targetValue is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - target - - targetValue - type: object - pods: - description: pods refers to a metric describing - each pod in the current scale target (for example, - transactions-processed-per-second). The values - will be averaged together before being compared - to the target value. - properties: - metricName: - description: metricName is the name of the - metric in question - type: string - selector: - description: selector is the string-encoded - form of a standard kubernetes label selector - for the given metric When set, it is passed - as an additional parameter to the metrics - server for more specific metrics scoping - When unset, just the metricName will be - used to gather metrics. - properties: - matchExpressions: - description: matchExpressions is a list - of label selector requirements. The - requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label key - that the selector applies to. - type: string - operator: - description: operator represents - a key's relationship to a set - of values. Valid operators are - In, NotIn, Exists and DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values array - must be non-empty. If the operator - is Exists or DoesNotExist, the - values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are ANDed. - type: object - type: object - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the metric across - all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - metricName - - targetAverageValue - type: object - resource: - description: resource refers to a resource metric - (such as those specified in requests and limits) - known to Kubernetes describing each pod in the - current scale target (e.g. CPU or memory). Such - metrics are built in to Kubernetes, and have - special scaling options on top of those available - to normal per-pod metrics using the "pods" source. - properties: - name: - description: name is the name of the resource - in question. - type: string - targetAverageUtilization: - description: targetAverageUtilization is the - target value of the average of the resource - metric across all relevant pods, represented - as a percentage of the requested value of - the resource for the pods. - format: int32 - type: integer - targetAverageValue: - anyOf: - - type: integer - - type: string - description: targetAverageValue is the target - value of the average of the resource metric - across all relevant pods, as a raw value - (instead of as a percentage of the request), - similar to the "pods" metric source type. - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - name - type: object - type: - description: type is the type of metric source. It - should be one of "Object", "Pods" or "Resource", - each mapping to a matching field in the object. - type: string - required: - - type - type: object - type: array - minReplicas: - format: int32 - type: integer - required: - - maxReplicas - type: object - kedaSpec: - description: SeldonScaledObjectSpec is the spec for a KEDA - ScaledObject resource - properties: - advanced: - description: AdvancedConfig specifies advance scaling - options - properties: - horizontalPodAutoscalerConfig: - description: HorizontalPodAutoscalerConfig specifies - horizontal scale config - properties: - behavior: - description: HorizontalPodAutoscalerBehavior - configures the scaling behavior of the target - in both Up and Down directions (scaleUp and - scaleDown fields respectively). - properties: - scaleDown: - description: scaleDown is scaling policy - for scaling Down. If not set, the default - value is to allow to scale down to minReplicas - pods, with a 300 second stabilization - window (i.e., the highest recommendation - for the last 300sec is used). - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - scaleUp: - description: 'scaleUp is scaling policy - for scaling Up. If not set, the default - value is the higher of: * increase no - more than 4 pods per 60 seconds * double - the number of pods per 60 seconds No stabilization - is used.' - properties: - policies: - description: policies is a list of potential - scaling polices which can be used - during scaling. At least one policy - must be specified, otherwise the HPAScalingRules - will be discarded as invalid - items: - description: HPAScalingPolicy is a - single policy which must hold true - for a specified past interval. - properties: - periodSeconds: - description: PeriodSeconds specifies - the window of time for which - the policy should hold true. - PeriodSeconds must be greater - than zero and less than or equal - to 1800 (30 min). - format: int32 - type: integer - type: - description: Type is used to specify - the scaling policy. - type: string - value: - description: Value contains the - amount of change which is permitted - by the policy. It must be greater - than zero - format: int32 - type: integer - required: - - periodSeconds - - type - - value - type: object - type: array - selectPolicy: - description: selectPolicy is used to - specify which policy should be used. - If not set, the default value MaxPolicySelect - is used. - type: string - stabilizationWindowSeconds: - description: 'StabilizationWindowSeconds - is the number of seconds for which - past recommendations should be considered - while scaling up or scaling down. - StabilizationWindowSeconds must be - greater than or equal to zero and - less than or equal to 3600 (one hour). - If not set, use the default values: - - For scale up: 0 (i.e. no stabilization - is done). - For scale down: 300 (i.e. - the stabilization window is 300 seconds - long).' - format: int32 - type: integer - type: object - type: object - resourceMetrics: - items: - description: ResourceMetricSource indicates - how to scale on a resource metric known - to Kubernetes, as specified in requests - and limits, describing each pod in the current - scale target (e.g. CPU or memory). The - values will be averaged together before - being compared to the target. Such metrics - are built in to Kubernetes, and have special - scaling options on top of those available - to normal per-pod metrics using the "pods" - source. Only one "target" type should be - set. - properties: - name: - description: name is the name of the resource - in question. - type: string - target: - description: target specifies the target - value for the given metric - properties: - averageUtilization: - description: averageUtilization is - the target value of the average - of the resource metric across all - relevant pods, represented as a - percentage of the requested value - of the resource for the pods. Currently - only valid for Resource metric source - type - format: int32 - type: integer - averageValue: - anyOf: - - type: integer - - type: string - description: averageValue is the target - value of the average of the metric - across all relevant pods (as a quantity) - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - type: - description: type represents whether - the metric type is Utilization, - Value, or AverageValue - type: string - value: - anyOf: - - type: integer - - type: string - description: value is the target value - of the metric (as a quantity). - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - required: - - type - type: object - required: - - name - - target - type: object - type: array - type: object - restoreToOriginalReplicaCount: - type: boolean - type: object - cooldownPeriod: - format: int32 - type: integer - maxReplicaCount: - format: int32 - type: integer - minReplicaCount: - format: int32 - type: integer - pollingInterval: - format: int32 - type: integer - triggers: - items: - description: ScaleTriggers reference the scaler that - will be used - properties: - authenticationRef: - description: ScaledObjectAuthRef points to the - TriggerAuthentication object that is used to - authenticate the scaler with the environment - properties: - name: - type: string - required: - - name - type: object - metadata: - additionalProperties: - type: string - type: object - name: - type: string - type: - type: string - required: - - metadata - - type - type: object - type: array - required: - - triggers - type: object - metadata: - type: object - pdbSpec: - properties: - maxUnavailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at most "maxUnavailable" - pods in the deployment corresponding to a componentSpec - are unavailable after the eviction, i.e. even in absence - of the evicted pod. For example, one can prevent all - voluntary evictions by specifying 0. MaxUnavailable - and MinAvailable are mutually exclusive. - x-kubernetes-int-or-string: true - minAvailable: - anyOf: - - type: integer - - type: string - description: An eviction is allowed if at least "minAvailable" - pods in the deployment corresponding to a componentSpec - will still be available after the eviction, i.e. even - in the absence of the evicted pod. So for example - you can prevent all voluntary evictions by specifying - "100%". - x-kubernetes-int-or-string: true - type: object - replicas: - format: int32 - type: integer - spec: - description: PodSpec is a description of a pod. - properties: - activeDeadlineSeconds: - description: Optional duration in seconds the pod may - be active on the node relative to StartTime before - the system will actively try to mark it failed and - kill associated containers. Value must be a positive - integer. - format: int64 - type: integer - affinity: - description: If specified, the pod's scheduling constraints - properties: - nodeAffinity: - description: Describes node affinity scheduling - rules for the pod. - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node matches the corresponding matchExpressions; - the node(s) with the highest sum are the most - preferred. - items: - description: An empty preferred scheduling - term matches all objects with implicit weight - 0 (i.e. it's a no-op). A null preferred - scheduling term matches no objects (i.e. - is also a no-op). - properties: - preference: - description: A node selector term, associated - with the corresponding weight. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - description: Weight associated with matching - the corresponding nodeSelectorTerm, - in the range 1-100. - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to an update), the - system may or may not try to eventually evict - the pod from its node. - properties: - nodeSelectorTerms: - description: Required. A list of node selector - terms. The terms are ORed. - items: - description: A null or empty node selector - term matches no objects. The requirements - of them are ANDed. The TopologySelectorTerm - type implements a subset of the NodeSelectorTerm. - properties: - matchExpressions: - description: A list of node selector - requirements by node's labels. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - description: A list of node selector - requirements by node's fields. - items: - description: A node selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: The label key that - the selector applies to. - type: string - operator: - description: Represents a key's - relationship to a set of values. - Valid operators are In, NotIn, - Exists, DoesNotExist. Gt, - and Lt. - type: string - values: - description: An array of string - values. If the operator is - In or NotIn, the values array - must be non-empty. If the - operator is Exists or DoesNotExist, - the values array must be empty. - If the operator is Gt or Lt, - the values array must have - a single element, which will - be interpreted as an integer. - This array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - description: Describes pod affinity scheduling rules - (e.g. co-locate this pod in the same node, zone, - etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the affinity expressions - specified by this field, but it may choose - a node that violates one or more of the expressions. - The node that is most preferred is the one - with the greatest sum of weights, i.e. for - each node that meets all of the scheduling - requirements (resource request, requiredDuringScheduling - affinity expressions, etc.), compute a sum - by iterating through the elements of this - field and adding "weight" to the sum if the - node has pods which matches the corresponding - podAffinityTerm; the node(s) with the highest - sum are the most preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the affinity requirements specified - by this field are not met at scheduling time, - the pod will not be scheduled onto the node. - If the affinity requirements specified by - this field cease to be met at some point during - pod execution (e.g. due to a pod label update), - the system may or may not try to eventually - evict the pod from its node. When there are - multiple elements, the lists of nodes corresponding - to each podAffinityTerm are intersected, i.e. - all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - description: Describes pod anti-affinity scheduling - rules (e.g. avoid putting this pod in the same - node, zone, etc. as some other pod(s)). - properties: - preferredDuringSchedulingIgnoredDuringExecution: - description: The scheduler will prefer to schedule - pods to nodes that satisfy the anti-affinity - expressions specified by this field, but it - may choose a node that violates one or more - of the expressions. The node that is most - preferred is the one with the greatest sum - of weights, i.e. for each node that meets - all of the scheduling requirements (resource - request, requiredDuringScheduling anti-affinity - expressions, etc.), compute a sum by iterating - through the elements of this field and adding - "weight" to the sum if the node has pods which - matches the corresponding podAffinityTerm; - the node(s) with the highest sum are the most - preferred. - items: - description: The weights of all of the matched - WeightedPodAffinityTerm fields are added - per-node to find the most preferred node(s) - properties: - podAffinityTerm: - description: Required. A pod affinity - term, associated with the corresponding - weight. - properties: - labelSelector: - description: A label query over a - set of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions - is a list of label selector - requirements. The requirements - are ANDed. - items: - description: A label selector - requirement is a selector - that contains values, a key, - and an operator that relates - the key and values. - properties: - key: - description: key is the - label key that the selector - applies to. - type: string - operator: - description: operator represents - a key's relationship to - a set of values. Valid - operators are In, NotIn, - Exists and DoesNotExist. - type: string - values: - description: values is an - array of string values. - If the operator is In - or NotIn, the values array - must be non-empty. If - the operator is Exists - or DoesNotExist, the values - array must be empty. This - array is replaced during - a strategic merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a - map of {key,value} pairs. A - single {key,value} in the matchLabels - map is equivalent to an element - of matchExpressions, whose key - field is "key", the operator - is "In", and the values array - contains only "value". The requirements - are ANDed. - type: object - type: object - namespaces: - description: namespaces specifies - which namespaces the labelSelector - applies to (matches against); null - or empty list means "this pod's - namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where - co-located is defined as running - on a node whose value of the label - with key topologyKey matches that - of any node on which any of the - selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - weight: - description: weight associated with matching - the corresponding podAffinityTerm, in - the range 1-100. - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - description: If the anti-affinity requirements - specified by this field are not met at scheduling - time, the pod will not be scheduled onto the - node. If the anti-affinity requirements specified - by this field cease to be met at some point - during pod execution (e.g. due to a pod label - update), the system may or may not try to - eventually evict the pod from its node. When - there are multiple elements, the lists of - nodes corresponding to each podAffinityTerm - are intersected, i.e. all terms must be satisfied. - items: - description: Defines a set of pods (namely - those matching the labelSelector relative - to the given namespace(s)) that this pod - should be co-located (affinity) or not co-located - (anti-affinity) with, where co-located is - defined as running on a node whose value - of the label with key matches - that of any node on which a pod of the set - of pods is running - properties: - labelSelector: - description: A label query over a set - of resources, in this case pods. - properties: - matchExpressions: - description: matchExpressions is a - list of label selector requirements. - The requirements are ANDed. - items: - description: A label selector requirement - is a selector that contains values, - a key, and an operator that relates - the key and values. - properties: - key: - description: key is the label - key that the selector applies - to. - type: string - operator: - description: operator represents - a key's relationship to a - set of values. Valid operators - are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array - of string values. If the operator - is In or NotIn, the values - array must be non-empty. If - the operator is Exists or - DoesNotExist, the values array - must be empty. This array - is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map - of {key,value} pairs. A single {key,value} - in the matchLabels map is equivalent - to an element of matchExpressions, - whose key field is "key", the operator - is "In", and the values array contains - only "value". The requirements are - ANDed. - type: object - type: object - namespaces: - description: namespaces specifies which - namespaces the labelSelector applies - to (matches against); null or empty - list means "this pod's namespace" - items: - type: string - type: array - topologyKey: - description: This pod should be co-located - (affinity) or not co-located (anti-affinity) - with the pods matching the labelSelector - in the specified namespaces, where co-located - is defined as running on a node whose - value of the label with key topologyKey - matches that of any node on which any - of the selected pods is running. Empty - topologyKey is not allowed. - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - automountServiceAccountToken: - description: AutomountServiceAccountToken indicates - whether a service account token should be automatically - mounted. - type: boolean - containers: - description: List of containers belonging to the pod. - Containers cannot currently be added or removed. There - must be at least one container in a Pod. Cannot be - updated. - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - dnsConfig: - description: Specifies the DNS parameters of a pod. - Parameters specified here will be merged to the generated - DNS configuration based on DNSPolicy. - properties: - nameservers: - description: A list of DNS name server IP addresses. - This will be appended to the base nameservers - generated from DNSPolicy. Duplicated nameservers - will be removed. - items: - type: string - type: array - options: - description: A list of DNS resolver options. This - will be merged with the base options generated - from DNSPolicy. Duplicated entries will be removed. - Resolution options given in Options will override - those that appear in the base DNSPolicy. - items: - description: PodDNSConfigOption defines DNS resolver - options of a pod. - properties: - name: - description: Required. - type: string - value: - type: string - type: object - type: array - searches: - description: A list of DNS search domains for host-name - lookup. This will be appended to the base search - paths generated from DNSPolicy. Duplicated search - paths will be removed. - items: - type: string - type: array - type: object - dnsPolicy: - description: Set DNS policy for the pod. Defaults to - "ClusterFirst". Valid values are 'ClusterFirstWithHostNet', - 'ClusterFirst', 'Default' or 'None'. DNS parameters - given in DNSConfig will be merged with the policy - selected with DNSPolicy. To have DNS options set along - with hostNetwork, you have to specify DNS policy explicitly - to 'ClusterFirstWithHostNet'. - type: string - enableServiceLinks: - description: 'EnableServiceLinks indicates whether information - about services should be injected into pod''s environment - variables, matching the syntax of Docker links. Optional: - Defaults to true.' - type: boolean - ephemeralContainers: - description: List of ephemeral containers run in this - pod. Ephemeral containers may be run in an existing - pod to perform user-initiated actions such as debugging. - This list cannot be specified when creating a pod, - and it cannot be modified by updating the pod spec. - In order to add an ephemeral container to an existing - pod, use the pod's ephemeralcontainers subresource. - This field is alpha-level and is only honored by servers - that enable the EphemeralContainers feature. - items: - description: An EphemeralContainer is a container - that may be added temporarily to an existing pod - for user-initiated activities such as debugging. - Ephemeral containers have no resource or scheduling - guarantees, and they will not be restarted when - they exit or when a pod is removed or restarted. - If an ephemeral container causes a pod to exceed - its resource allocation, the pod may be evicted. - Ephemeral containers may not be added by directly - updating the pod spec. They must be added via the - pod's ephemeralcontainers subresource, and they - will appear in the pod spec once added. This is - an alpha feature enabled by the EphemeralContainers - feature flag. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Lifecycle is not allowed for ephemeral - containers. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the ephemeral container specified - as a DNS_LABEL. This name must be unique among - all containers, init containers and ephemeral - containers. - type: string - ports: - description: Ports are not allowed for ephemeral - containers. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: Resources are not allowed for ephemeral - containers. Ephemeral containers use spare resources - already allocated to the pod. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: SecurityContext is not allowed for - ephemeral containers. - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: Probes are not allowed for ephemeral - containers. - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - targetContainerName: - description: If set, the name of the container - from PodSpec that this ephemeral container targets. - The ephemeral container will be run in the namespaces - (IPC, PID, etc) of this container. If not set - then the ephemeral container is run in whatever - namespaces are shared for the pod. Note that - the container runtime must support this feature. - type: string - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - hostAliases: - description: HostAliases is an optional list of hosts - and IPs that will be injected into the pod's hosts - file if specified. This is only valid for non-hostNetwork - pods. - items: - description: HostAlias holds the mapping between IP - and hostnames that will be injected as an entry - in the pod's hosts file. - properties: - hostnames: - description: Hostnames for the above IP address. - items: - type: string - type: array - ip: - description: IP address of the host file entry. - type: string - type: object - type: array - hostIPC: - description: 'Use the host''s ipc namespace. Optional: - Default to false.' - type: boolean - hostNetwork: - description: Host networking requested for this pod. - Use the host's network namespace. If this option is - set, the ports that will be used must be specified. - Default to false. - type: boolean - hostPID: - description: 'Use the host''s pid namespace. Optional: - Default to false.' - type: boolean - hostname: - description: Specifies the hostname of the Pod If not - specified, the pod's hostname will be set to a system-defined - value. - type: string - imagePullSecrets: - description: 'ImagePullSecrets is an optional list of - references to secrets in the same namespace to use - for pulling any of the images used by this PodSpec. - If specified, these secrets will be passed to individual - puller implementations for them to use. For example, - in the case of docker, only DockerConfig type secrets - are honored. More info: https://kubernetes.io/docs/concepts/containers/images#specifying-imagepullsecrets-on-a-pod' - items: - description: LocalObjectReference contains enough - information to let you locate the referenced object - inside the same namespace. - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, kind, - uid?' - type: string - type: object - type: array - initContainers: - description: 'List of initialization containers belonging - to the pod. Init containers are executed in order - prior to containers being started. If any init container - fails, the pod is considered to have failed and is - handled according to its restartPolicy. The name for - an init container or normal container must be unique - among all containers. Init containers may not have - Lifecycle actions, Readiness probes, Liveness probes, - or Startup probes. The resourceRequirements of an - init container are taken into account during scheduling - by finding the highest request/limit for each resource - type, and then using the max of of that value or the - sum of the normal containers. Limits are applied to - init containers in a similar fashion. Init containers - cannot currently be added or removed. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/' - items: - description: A single application container that you - want to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The - docker image''s CMD is used if this is not provided. - Variable references $(VAR_NAME) are expanded - using the container''s environment. If a variable - cannot be resolved, the reference in the input - string will be unchanged. The $(VAR_NAME) syntax - can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot - be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within - a shell. The docker image''s ENTRYPOINT is used - if this is not provided. Variable references - $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, - the reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a - double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether - the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to - set in the container. Cannot be updated. - items: - description: EnvVar represents an environment - variable present in a Container. - properties: - name: - description: Name of the environment variable. - Must be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) - are expanded using the previous defined - environment variables in the container - and any service environment variables. - If a variable cannot be resolved, the - reference in the input string will be - unchanged. The $(VAR_NAME) syntax can - be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, - regardless of whether the variable exists - or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment - variable's value. Cannot be used if value - is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - ConfigMap or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the - pod: supports metadata.name, metadata.namespace, - metadata.labels, metadata.annotations, - spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema - the FieldPath is written in terms - of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to - select in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of - the container: only resources limits - and requests (limits.cpu, limits.memory, - limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required - for volumes, optional for env - vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output - format of the exposed resources, - defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource - to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret - in the pod's namespace - properties: - key: - description: The key of the secret - to select from. Must be a valid - secret key. - type: string - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. - apiVersion, kind, uid?' - type: string - optional: - description: Specify whether the - Secret or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment - variables in the container. The keys defined - within a source must be a C_IDENTIFIER. All - invalid keys will be reported as an event when - the container is starting. When a key exists - in multiple sources, the value associated with - the last source will take precedence. Values - defined by an Env with a duplicate key will - take precedence. Cannot be updated. - items: - description: EnvFromSource represents the source - of a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - must be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend - to each key in the ConfigMap. Must be - a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. - More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - must be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level - config management to default or override container - images in workload controllers like Deployments - and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, - Never, IfNotPresent. Defaults to Always if :latest - tag is specified, or IfNotPresent otherwise. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system - should take in response to container lifecycle - events. Cannot be updated. - properties: - postStart: - description: 'PostStart is called immediately - after a container is created. If the handler - fails, the container is terminated and restarted - according to its restart policy. Other management - of the container blocks until the hook completes. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately - before a container is terminated due to - an API request or management event such - as liveness/startup probe failure, preemption, - resource contention, etc. The handler is - not called if the container crashes or exits. - The reason for termination is passed to - the handler. The Pod''s termination grace - period countdown begins before the PreStop - hooked is executed. Regardless of the outcome - of the handler, the container will eventually - terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until - the termination grace period is reached. - More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies - the action to take. - properties: - command: - description: Command is the command - line to execute inside the container, - the working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it - is not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to - explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http - request to perform. - properties: - host: - description: Host name to connect - to, defaults to the pod IP. You - probably want to set "Host" in httpHeaders - instead. - type: string - httpHeaders: - description: Custom headers to set - in the request. HTTP allows repeated - headers. - items: - description: HTTPHeader describes - a custom header to be used in - HTTP probes - properties: - name: - description: The header field - name - type: string - value: - description: The header field - value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the - HTTP server. - type: string - port: - description: Name or number of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not - yet supported TODO: implement a realistic - TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name - to connect to, defaults to the pod - IP.' - type: string - port: - description: Number or name of the - port to access on the container. - Number must be in the range 1 to - 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. - Container will be restarted if the probe fails. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as - a DNS_LABEL. Each container in a pod must have - a unique name (DNS_LABEL). Cannot be updated. - type: string - ports: - description: List of ports to expose from the - container. Exposing a port here gives the system - additional information about the network connections - a container uses, but is primarily informational. - Not specifying a port here DOES NOT prevent - that port from being exposed. Any port which - is listening on the default "0.0.0.0" address - inside a container will be accessible from the - network. Cannot be updated. - items: - description: ContainerPort represents a network - port in a single container. - properties: - containerPort: - description: Number of port to expose on - the pod's IP address. This must be a valid - port number, 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external - port to. - type: string - hostPort: - description: Number of port to expose on - the host. If specified, this must be a - valid port number, 0 < x < 65536. If HostNetwork - is specified, this must match ContainerPort. - Most containers do not need this. - format: int32 - type: integer - name: - description: If specified, this must be - an IANA_SVC_NAME and unique within the - pod. Each named port in a pod must have - a unique name. Name for the port that - can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be - UDP, TCP, or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service - readiness. Container will be removed from service - endpoints if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this - container. Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum - amount of compute resources allowed. More - info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum - amount of compute resources required. If - Requests is omitted for a container, it - defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should - run with. More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls - whether a process can gain more privileges - than its parent process. This bool directly - controls if the no_new_privs flag will be - set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) - run as Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop - when running containers. Defaults to the - default set of capabilities granted by the - container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX - capabilities type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. - Processes in privileged containers are essentially - equivalent to root on the host. Defaults - to false. - type: boolean - procMount: - description: procMount denotes the type of - proc mount to use for the containers. The - default is DefaultProcMount which uses the - container runtime defaults for readonly - paths and masked paths. This requires the - ProcMountType feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a - read-only root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint - of the container process. Uses runtime default - if unset. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container - must run as a non-root user. If true, the - Kubelet will validate the image at runtime - to ensure that it does not run as UID 0 - (root) and fail to start the container if - it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint - of the container process. Defaults to user - specified in image metadata if unspecified. - May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied - to the container. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label - that applies to the container. - type: string - role: - description: Role is a SELinux role label - that applies to the container. - type: string - type: - description: Type is a SELinux type label - that applies to the container. - type: string - user: - description: User is a SELinux user label - that applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings - applied to all containers. If unspecified, - the options from the PodSecurityContext - will be used. If set in both SecurityContext - and PodSecurityContext, the value specified - in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where - the GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName - field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is - the name of the GMSA credential spec - to use. - type: string - runAsUserName: - description: The UserName in Windows to - run the entrypoint of the container - process. Defaults to the user specified - in image metadata if unspecified. May - also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext - takes precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the - Pod has successfully initialized. If specified, - no other probes are executed until this completes - successfully. If this probe fails, the Pod will - be restarted, just as if the livenessProbe failed. - This can be used to provide different probe - parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data - or warm a cache, than during steady-state operation. - This cannot be updated. This is a beta feature - enabled by the StartupProbe feature flag. More - info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the - action to take. - properties: - command: - description: Command is the command line - to execute inside the container, the - working directory for the command is - root ('/') in the container's filesystem. - The command is simply exec'd, it is - not run inside a shell, so traditional - shell instructions ('|', etc) won't - work. To use a shell, you need to explicitly - call out to that shell. Exit status - of 0 is treated as live/healthy and - non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures - for the probe to be considered failed after - having succeeded. Defaults to 3. Minimum - value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, - defaults to the pod IP. You probably - want to set "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in - the request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a - custom header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP - server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the - container has started before liveness probes - are initiated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform - the probe. Default to 10 seconds. Minimum - value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes - for the probe to be considered successful - after having failed. Defaults to 1. Must - be 1 for liveness and startup. Minimum value - is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action - involving a TCP port. TCP hooks not yet - supported TODO: implement a realistic TCP - lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port - to access on the container. Number must - be in the range 1 to 65535. Name must - be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which - the probe times out. Defaults to 1 second. - Minimum value is 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate - a buffer for stdin in the container runtime. - If this is not set, reads from stdin in the - container will always result in EOF. Default - is false. - type: boolean - stdinOnce: - description: Whether the container runtime should - close the stdin channel after it has been opened - by a single attach. When stdin is true the stdin - stream will remain open across multiple attach - sessions. If stdinOnce is set to true, stdin - is opened on container start, is empty until - the first client attaches to stdin, and then - remains open and accepts data until the client - disconnects, at which time stdin is closed and - remains closed until the container is restarted. - If this flag is false, a container processes - that reads from stdin will never receive an - EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file - to which the container''s termination message - will be written is mounted into the container''s - filesystem. Message written is intended to be - brief final status, such as an assertion failure - message. Will be truncated by the node if greater - than 4096 bytes. The total message length across - all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message - should be populated. File will use the contents - of terminationMessagePath to populate the container - status message on both success and failure. - FallbackToLogsOnError will use the last chunk - of container log output if the termination message - file is empty and the container exited with - an error. The log output is limited to 2048 - bytes or 80 lines, whichever is smaller. Defaults - to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate - a TTY for itself, also requires 'stdin' to be - true. Default is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block - devices to be used by the container. - items: - description: volumeDevice describes a mapping - of a raw block device within a container. - properties: - devicePath: - description: devicePath is the path inside - of the container that the device will - be mapped to. - type: string - name: - description: name must match the name of - a persistentVolumeClaim in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting - of a Volume within a container. - properties: - mountPath: - description: Path within the container at - which the volume should be mounted. Must - not contain ':'. - type: string - mountPropagation: - description: mountPropagation determines - how mounts are propagated from the host - to container and the other way around. - When not set, MountPropagationNone is - used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of - a Volume. - type: string - readOnly: - description: Mounted read-only if true, - read-write otherwise (false or unspecified). - Defaults to false. - type: boolean - subPath: - description: Path within the volume from - which the container's volume should be - mounted. Defaults to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume - from which the container's volume should - be mounted. Behaves similarly to SubPath - but environment variable references $(VAR_NAME) - are expanded using the container's environment. - Defaults to "" (volume's root). SubPathExpr - and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If - not specified, the container runtime's default - will be used, which might be configured in the - container image. Cannot be updated. - type: string - required: - - name - type: object - type: array - nodeName: - description: NodeName is a request to schedule this - pod onto a specific node. If it is non-empty, the - scheduler simply schedules this pod onto that node, - assuming that it fits resource requirements. - type: string - nodeSelector: - additionalProperties: - type: string - description: 'NodeSelector is a selector which must - be true for the pod to fit on a node. Selector which - must match a node''s labels for the pod to be scheduled - on that node. More info: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/' - type: object - overhead: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Overhead represents the resource overhead - associated with running a pod for a given RuntimeClass. - This field will be autopopulated at admission time - by the RuntimeClass admission controller. If the RuntimeClass - admission controller is enabled, overhead must not - be set in Pod create requests. The RuntimeClass admission - controller will reject Pod create requests which have - the overhead already set. If RuntimeClass is configured - and selected in the PodSpec, Overhead will be set - to the value defined in the corresponding RuntimeClass, - otherwise it will remain unset and treated as zero. - More info: https://git.k8s.io/enhancements/keps/sig-node/20190226-pod-overhead.md - This field is alpha-level as of Kubernetes v1.16, - and is only honored by servers that enable the PodOverhead - feature.' - type: object - preemptionPolicy: - description: PreemptionPolicy is the Policy for preempting - pods with lower priority. One of Never, PreemptLowerPriority. - Defaults to PreemptLowerPriority if unset. This field - is alpha-level and is only honored by servers that - enable the NonPreemptingPriority feature. - type: string - priority: - description: The priority value. Various system components - use this field to find the priority of the pod. When - Priority Admission Controller is enabled, it prevents - users from setting this field. The admission controller - populates this field from PriorityClassName. The higher - the value, the higher the priority. - format: int32 - type: integer - priorityClassName: - description: If specified, indicates the pod's priority. - "system-node-critical" and "system-cluster-critical" - are two special keywords which indicate the highest - priorities with the former being the highest priority. - Any other name must be defined by creating a PriorityClass - object with that name. If not specified, the pod priority - will be default or zero if there is no default. - type: string - readinessGates: - description: 'If specified, all readiness gates will - be evaluated for pod readiness. A pod is ready when - all its containers are ready AND all conditions specified - in the readiness gates have status equal to "True" - More info: https://git.k8s.io/enhancements/keps/sig-network/0007-pod-ready%2B%2B.md' - items: - description: PodReadinessGate contains the reference - to a pod condition - properties: - conditionType: - description: ConditionType refers to a condition - in the pod's condition list with matching type. - type: string - required: - - conditionType - type: object - type: array - restartPolicy: - description: 'Restart policy for all containers within - the pod. One of Always, OnFailure, Never. Default - to Always. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#restart-policy' - type: string - runtimeClassName: - description: 'RuntimeClassName refers to a RuntimeClass - object in the node.k8s.io group, which should be used - to run this pod. If no RuntimeClass resource matches - the named class, the pod will not be run. If unset - or empty, the "legacy" RuntimeClass will be used, - which is an implicit class with an empty definition - that uses the default runtime handler. More info: - https://git.k8s.io/enhancements/keps/sig-node/runtime-class.md - This is a beta feature as of Kubernetes v1.14.' - type: string - schedulerName: - description: If specified, the pod will be dispatched - by specified scheduler. If not specified, the pod - will be dispatched by default scheduler. - type: string - securityContext: - description: 'SecurityContext holds pod-level security - attributes and common container settings. Optional: - Defaults to empty. See type description for default - values of each field.' - properties: - fsGroup: - description: "A special supplemental group that - applies to all containers in a pod. Some volume - types allow the Kubelet to change the ownership - of that volume to be owned by the pod: \n 1. The - owning GID will be the FSGroup 2. The setgid bit - is set (new files created in the volume will be - owned by FSGroup) 3. The permission bits are OR'd - with rw-rw---- \n If unset, the Kubelet will not - modify the ownership and permissions of any volume." - format: int64 - type: integer - fsGroupChangePolicy: - description: 'fsGroupChangePolicy defines behavior - of changing ownership and permission of the volume - before being exposed inside Pod. This field will - only apply to volume types which support fsGroup - based ownership(and permissions). It will have - no effect on ephemeral volume types such as: secret, - configmaps and emptydir. Valid values are "OnRootMismatch" - and "Always". If not specified defaults to "Always".' - type: string - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in SecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence - for that container. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will - validate the image at runtime to ensure that it - does not run as UID 0 (root) and fail to start - the container if it does. If unset or false, no - such validation will be performed. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified - in image metadata if unspecified. May also be - set in SecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in - SecurityContext takes precedence for that container. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - all containers. If unspecified, the container - runtime will allocate a random SELinux context - for each container. May also be set in SecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence - for that container. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - supplementalGroups: - description: A list of groups applied to the first - process run in each container, in addition to - the container's primary GID. If unspecified, - no groups will be added to any container. - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls - used for the pod. Pods with unsupported sysctls - (by the container runtime) might fail to launch. - items: - description: Sysctl defines a kernel parameter - to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options - within a container's SecurityContext will be used. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the - GMSA admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run - the entrypoint of the container process. Defaults - to the user specified in image metadata if - unspecified. May also be set in PodSecurityContext. - If set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - serviceAccount: - description: 'DeprecatedServiceAccount is a depreciated - alias for ServiceAccountName. Deprecated: Use serviceAccountName - instead.' - type: string - serviceAccountName: - description: 'ServiceAccountName is the name of the - ServiceAccount to use to run this pod. More info: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/' - type: string - shareProcessNamespace: - description: 'Share a single process namespace between - all of the containers in a pod. When this is set containers - will be able to view and signal processes from other - containers in the same pod, and the first process - in each container will not be assigned PID 1. HostPID - and ShareProcessNamespace cannot both be set. Optional: - Default to false.' - type: boolean - subdomain: - description: If specified, the fully qualified Pod hostname - will be "...svc.". If not specified, the pod will not have - a domainname at all. - type: string - terminationGracePeriodSeconds: - description: Optional duration in seconds the pod needs - to terminate gracefully. May be decreased in delete - request. Value must be non-negative integer. The value - zero indicates delete immediately. If this value is - nil, the default grace period will be used instead. - The grace period is the duration in seconds after - the processes running in the pod are sent a termination - signal and the time when the processes are forcibly - halted with a kill signal. Set this value longer than - the expected cleanup time for your process. Defaults - to 30 seconds. - format: int64 - type: integer - tolerations: - description: If specified, the pod's tolerations. - items: - description: The pod this Toleration is attached to - tolerates any taint that matches the triple - using the matching operator . - properties: - effect: - description: Effect indicates the taint effect - to match. Empty means match all taint effects. - When specified, allowed values are NoSchedule, - PreferNoSchedule and NoExecute. - type: string - key: - description: Key is the taint key that the toleration - applies to. Empty means match all taint keys. - If the key is empty, operator must be Exists; - this combination means to match all values and - all keys. - type: string - operator: - description: Operator represents a key's relationship - to the value. Valid operators are Exists and - Equal. Defaults to Equal. Exists is equivalent - to wildcard for value, so that a pod can tolerate - all taints of a particular category. - type: string - tolerationSeconds: - description: TolerationSeconds represents the - period of time the toleration (which must be - of effect NoExecute, otherwise this field is - ignored) tolerates the taint. By default, it - is not set, which means tolerate the taint forever - (do not evict). Zero and negative values will - be treated as 0 (evict immediately) by the system. - format: int64 - type: integer - value: - description: Value is the taint value the toleration - matches to. If the operator is Exists, the value - should be empty, otherwise just a regular string. - type: string - type: object - type: array - topologySpreadConstraints: - description: TopologySpreadConstraints describes how - a group of pods ought to spread across topology domains. - Scheduler will schedule pods in a way which abides - by the constraints. This field is only honored by - clusters that enable the EvenPodsSpread feature. All - topologySpreadConstraints are ANDed. - items: - description: TopologySpreadConstraint specifies how - to spread matching pods among the given topology. - properties: - labelSelector: - description: LabelSelector is used to find matching - pods. Pods that match this label selector are - counted to determine the number of pods in their - corresponding topology domain. - properties: - matchExpressions: - description: matchExpressions is a list of - label selector requirements. The requirements - are ANDed. - items: - description: A label selector requirement - is a selector that contains values, a - key, and an operator that relates the - key and values. - properties: - key: - description: key is the label key that - the selector applies to. - type: string - operator: - description: operator represents a key's - relationship to a set of values. Valid - operators are In, NotIn, Exists and - DoesNotExist. - type: string - values: - description: values is an array of string - values. If the operator is In or NotIn, - the values array must be non-empty. - If the operator is Exists or DoesNotExist, - the values array must be empty. This - array is replaced during a strategic - merge patch. - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - description: matchLabels is a map of {key,value} - pairs. A single {key,value} in the matchLabels - map is equivalent to an element of matchExpressions, - whose key field is "key", the operator is - "In", and the values array contains only - "value". The requirements are ANDed. - type: object - type: object - maxSkew: - description: 'MaxSkew describes the degree to - which pods may be unevenly distributed. It''s - the maximum permitted difference between the - number of matching pods in any two topology - domains of a given topology type. For example, - in a 3-zone cluster, MaxSkew is set to 1, and - pods with the same labelSelector spread as 1/1/0: - | zone1 | zone2 | zone3 | | P | P | | - - if MaxSkew is 1, incoming pod can only be - scheduled to zone3 to become 1/1/1; scheduling - it onto zone1(zone2) would make the ActualSkew(2-0) - on zone1(zone2) violate MaxSkew(1). - if MaxSkew - is 2, incoming pod can be scheduled onto any - zone. It''s a required field. Default value - is 1 and 0 is not allowed.' - format: int32 - type: integer - topologyKey: - description: TopologyKey is the key of node labels. - Nodes that have a label with this key and identical - values are considered to be in the same topology. - We consider each as a "bucket", - and try to put balanced number of pods into - each bucket. It's a required field. - type: string - whenUnsatisfiable: - description: 'WhenUnsatisfiable indicates how - to deal with a pod if it doesn''t satisfy the - spread constraint. - DoNotSchedule (default) - tells the scheduler not to schedule it - ScheduleAnyway - tells the scheduler to still schedule it It''s - considered as "Unsatisfiable" if and only if - placing incoming pod on any topology violates - "MaxSkew". For example, in a 3-zone cluster, - MaxSkew is set to 1, and pods with the same - labelSelector spread as 3/1/1: | zone1 | zone2 - | zone3 | | P P P | P | P | If WhenUnsatisfiable - is set to DoNotSchedule, incoming pod can only - be scheduled to zone2(zone3) to become 3/2/1(3/1/2) - as ActualSkew(2-1) on zone2(zone3) satisfies - MaxSkew(1). In other words, the cluster can - still be imbalanced, but scheduler won''t make - it *more* imbalanced. It''s a required field.' - type: string - required: - - maxSkew - - topologyKey - - whenUnsatisfiable - type: object - type: array - x-kubernetes-list-map-keys: - - topologyKey - - whenUnsatisfiable - x-kubernetes-list-type: map - volumes: - description: 'List of volumes that can be mounted by - containers belonging to the pod. More info: https://kubernetes.io/docs/concepts/storage/volumes' - items: - type: object - type: array - required: - - containers - type: object - type: object - type: array - engineResources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of compute - resources required. If Requests is omitted for a container, - it defaults to Limits if that is explicitly specified, otherwise - to an implementation-defined value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - explainer: - properties: - config: - additionalProperties: - type: string - type: object - containerSpec: - description: A single application container that you want - to run within a pod. - properties: - args: - description: 'Arguments to the entrypoint. The docker - image''s CMD is used if this is not provided. Variable - references $(VAR_NAME) are expanded using the container''s - environment. If a variable cannot be resolved, the reference - in the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Cannot be updated. - More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - command: - description: 'Entrypoint array. Not executed within a - shell. The docker image''s ENTRYPOINT is used if this - is not provided. Variable references $(VAR_NAME) are - expanded using the container''s environment. If a variable - cannot be resolved, the reference in the input string - will be unchanged. The $(VAR_NAME) syntax can be escaped - with a double $$, ie: $$(VAR_NAME). Escaped references - will never be expanded, regardless of whether the variable - exists or not. Cannot be updated. More info: https://kubernetes.io/docs/tasks/inject-data-application/define-command-argument-container/#running-a-command-in-a-shell' - items: - type: string - type: array - env: - description: List of environment variables to set in the - container. Cannot be updated. - items: - description: EnvVar represents an environment variable - present in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are - expanded using the previous defined environment - variables in the container and any service environment - variables. If a variable cannot be resolved, the - reference in the input string will be unchanged. - The $(VAR_NAME) syntax can be escaped with a double - $$, ie: $$(VAR_NAME). Escaped references will - never be expanded, regardless of whether the variable - exists or not. Defaults to "".' - type: string - valueFrom: - description: Source for the environment variable's - value. Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap - or its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select - in the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for - volumes, optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format - of the exposed resources, defaults to - "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the - pod's namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More - info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret - or its key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - description: List of sources to populate environment variables - in the container. The keys defined within a source must - be a C_IDENTIFIER. All invalid keys will be reported - as an event when the container is starting. When a key - exists in multiple sources, the value associated with - the last source will take precedence. Values defined - by an Env with a duplicate key will take precedence. - Cannot be updated. - items: - description: EnvFromSource represents the source of - a set of ConfigMaps - properties: - configMapRef: - description: The ConfigMap to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap must - be defined - type: boolean - type: object - prefix: - description: An optional identifier to prepend to - each key in the ConfigMap. Must be a C_IDENTIFIER. - type: string - secretRef: - description: The Secret to select from - properties: - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret must - be defined - type: boolean - type: object - type: object - type: array - image: - description: 'Docker image name. More info: https://kubernetes.io/docs/concepts/containers/images - This field is optional to allow higher level config - management to default or override container images in - workload controllers like Deployments and StatefulSets.' - type: string - imagePullPolicy: - description: 'Image pull policy. One of Always, Never, - IfNotPresent. Defaults to Always if :latest tag is specified, - or IfNotPresent otherwise. Cannot be updated. More info: - https://kubernetes.io/docs/concepts/containers/images#updating-images' - type: string - lifecycle: - description: Actions that the management system should - take in response to container lifecycle events. Cannot - be updated. - properties: - postStart: - description: 'PostStart is called immediately after - a container is created. If the handler fails, the - container is terminated and restarted according - to its restart policy. Other management of the container - blocks until the hook completes. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - preStop: - description: 'PreStop is called immediately before - a container is terminated due to an API request - or management event such as liveness/startup probe - failure, preemption, resource contention, etc. The - handler is not called if the container crashes or - exits. The reason for termination is passed to the - handler. The Pod''s termination grace period countdown - begins before the PreStop hooked is executed. Regardless - of the outcome of the handler, the container will - eventually terminate within the Pod''s termination - grace period. Other management of the container - blocks until the hook completes or until the termination - grace period is reached. More info: https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks' - properties: - exec: - description: One and only one of the following - should be specified. Exec specifies the action - to take. - properties: - command: - description: Command is the command line to - execute inside the container, the working - directory for the command is root ('/') - in the container's filesystem. The command - is simply exec'd, it is not run inside a - shell, so traditional shell instructions - ('|', etc) won't work. To use a shell, you - need to explicitly call out to that shell. - Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - httpGet: - description: HTTPGet specifies the http request - to perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set - "Host" in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the - request. HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom - header to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting - to the host. Defaults to HTTP. - type: string - required: - - port - type: object - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: - implement a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect - to, defaults to the pod IP.' - type: string - port: - description: Number or name of the port to - access on the container. Number must be - in the range 1 to 65535. Name must be an - IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - type: object - type: object - livenessProbe: - description: 'Periodic probe of container liveness. Container - will be restarted if the probe fails. Cannot be updated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - name: - description: Name of the container specified as a DNS_LABEL. - Each container in a pod must have a unique name (DNS_LABEL). - Cannot be updated. - type: string - ports: - description: List of ports to expose from the container. - Exposing a port here gives the system additional information - about the network connections a container uses, but - is primarily informational. Not specifying a port here - DOES NOT prevent that port from being exposed. Any port - which is listening on the default "0.0.0.0" address - inside a container will be accessible from the network. - Cannot be updated. - items: - description: ContainerPort represents a network port - in a single container. - properties: - containerPort: - description: Number of port to expose on the pod's - IP address. This must be a valid port number, - 0 < x < 65536. - format: int32 - type: integer - hostIP: - description: What host IP to bind the external port - to. - type: string - hostPort: - description: Number of port to expose on the host. - If specified, this must be a valid port number, - 0 < x < 65536. If HostNetwork is specified, this - must match ContainerPort. Most containers do not - need this. - format: int32 - type: integer - name: - description: If specified, this must be an IANA_SVC_NAME - and unique within the pod. Each named port in - a pod must have a unique name. Name for the port - that can be referred to by services. - type: string - protocol: - description: Protocol for port. Must be UDP, TCP, - or SCTP. Defaults to "TCP". - type: string - required: - - containerPort - - protocol - type: object - type: array - x-kubernetes-list-map-keys: - - containerPort - - protocol - x-kubernetes-list-type: map - readinessProbe: - description: 'Periodic probe of container service readiness. - Container will be removed from service endpoints if - the probe fails. Cannot be updated. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - resources: - description: 'Compute Resources required by this container. - Cannot be updated. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount - of compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount - of compute resources required. If Requests is omitted - for a container, it defaults to Limits if that is - explicitly specified, otherwise to an implementation-defined - value. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - securityContext: - description: 'Security options the pod should run with. - More info: https://kubernetes.io/docs/concepts/policy/security-context/ - More info: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/' - properties: - allowPrivilegeEscalation: - description: 'AllowPrivilegeEscalation controls whether - a process can gain more privileges than its parent - process. This bool directly controls if the no_new_privs - flag will be set on the container process. AllowPrivilegeEscalation - is true always when the container is: 1) run as - Privileged 2) has CAP_SYS_ADMIN' - type: boolean - capabilities: - description: The capabilities to add/drop when running - containers. Defaults to the default set of capabilities - granted by the container runtime. - properties: - add: - description: Added capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - drop: - description: Removed capabilities - items: - description: Capability represent POSIX capabilities - type - type: string - type: array - type: object - privileged: - description: Run container in privileged mode. Processes - in privileged containers are essentially equivalent - to root on the host. Defaults to false. - type: boolean - procMount: - description: procMount denotes the type of proc mount - to use for the containers. The default is DefaultProcMount - which uses the container runtime defaults for readonly - paths and masked paths. This requires the ProcMountType - feature flag to be enabled. - type: string - readOnlyRootFilesystem: - description: Whether this container has a read-only - root filesystem. Default is false. - type: boolean - runAsGroup: - description: The GID to run the entrypoint of the - container process. Uses runtime default if unset. - May also be set in PodSecurityContext. If set in - both SecurityContext and PodSecurityContext, the - value specified in SecurityContext takes precedence. - format: int64 - type: integer - runAsNonRoot: - description: Indicates that the container must run - as a non-root user. If true, the Kubelet will validate - the image at runtime to ensure that it does not - run as UID 0 (root) and fail to start the container - if it does. If unset or false, no such validation - will be performed. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - type: boolean - runAsUser: - description: The UID to run the entrypoint of the - container process. Defaults to user specified in - image metadata if unspecified. May also be set in - PodSecurityContext. If set in both SecurityContext - and PodSecurityContext, the value specified in SecurityContext - takes precedence. - format: int64 - type: integer - seLinuxOptions: - description: The SELinux context to be applied to - the container. If unspecified, the container runtime - will allocate a random SELinux context for each - container. May also be set in PodSecurityContext. If - set in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes precedence. - properties: - level: - description: Level is SELinux level label that - applies to the container. - type: string - role: - description: Role is a SELinux role label that - applies to the container. - type: string - type: - description: Type is a SELinux type label that - applies to the container. - type: string - user: - description: User is a SELinux user label that - applies to the container. - type: string - type: object - windowsOptions: - description: The Windows specific settings applied - to all containers. If unspecified, the options from - the PodSecurityContext will be used. If set in both - SecurityContext and PodSecurityContext, the value - specified in SecurityContext takes precedence. - properties: - gmsaCredentialSpec: - description: GMSACredentialSpec is where the GMSA - admission webhook (https://github.com/kubernetes-sigs/windows-gmsa) - inlines the contents of the GMSA credential - spec named by the GMSACredentialSpecName field. - type: string - gmsaCredentialSpecName: - description: GMSACredentialSpecName is the name - of the GMSA credential spec to use. - type: string - runAsUserName: - description: The UserName in Windows to run the - entrypoint of the container process. Defaults - to the user specified in image metadata if unspecified. - May also be set in PodSecurityContext. If set - in both SecurityContext and PodSecurityContext, - the value specified in SecurityContext takes - precedence. - type: string - type: object - type: object - startupProbe: - description: 'StartupProbe indicates that the Pod has - successfully initialized. If specified, no other probes - are executed until this completes successfully. If this - probe fails, the Pod will be restarted, just as if the - livenessProbe failed. This can be used to provide different - probe parameters at the beginning of a Pod''s lifecycle, - when it might take a long time to load data or warm - a cache, than during steady-state operation. This cannot - be updated. This is a beta feature enabled by the StartupProbe - feature flag. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - properties: - exec: - description: One and only one of the following should - be specified. Exec specifies the action to take. - properties: - command: - description: Command is the command line to execute - inside the container, the working directory - for the command is root ('/') in the container's - filesystem. The command is simply exec'd, it - is not run inside a shell, so traditional shell - instructions ('|', etc) won't work. To use a - shell, you need to explicitly call out to that - shell. Exit status of 0 is treated as live/healthy - and non-zero is unhealthy. - items: - type: string - type: array - type: object - failureThreshold: - description: Minimum consecutive failures for the - probe to be considered failed after having succeeded. - Defaults to 3. Minimum value is 1. - format: int32 - type: integer - httpGet: - description: HTTPGet specifies the http request to - perform. - properties: - host: - description: Host name to connect to, defaults - to the pod IP. You probably want to set "Host" - in httpHeaders instead. - type: string - httpHeaders: - description: Custom headers to set in the request. - HTTP allows repeated headers. - items: - description: HTTPHeader describes a custom header - to be used in HTTP probes - properties: - name: - description: The header field name - type: string - value: - description: The header field value - type: string - required: - - name - - value - type: object - type: array - path: - description: Path to access on the HTTP server. - type: string - port: - anyOf: - - type: integer - - type: string - description: Name or number of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - scheme: - description: Scheme to use for connecting to the - host. Defaults to HTTP. - type: string - required: - - port - type: object - initialDelaySeconds: - description: 'Number of seconds after the container - has started before liveness probes are initiated. - More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - periodSeconds: - description: How often (in seconds) to perform the - probe. Default to 10 seconds. Minimum value is 1. - format: int32 - type: integer - successThreshold: - description: Minimum consecutive successes for the - probe to be considered successful after having failed. - Defaults to 1. Must be 1 for liveness and startup. - Minimum value is 1. - format: int32 - type: integer - tcpSocket: - description: 'TCPSocket specifies an action involving - a TCP port. TCP hooks not yet supported TODO: implement - a realistic TCP lifecycle hook' - properties: - host: - description: 'Optional: Host name to connect to, - defaults to the pod IP.' - type: string - port: - anyOf: - - type: integer - - type: string - description: Number or name of the port to access - on the container. Number must be in the range - 1 to 65535. Name must be an IANA_SVC_NAME. - x-kubernetes-int-or-string: true - required: - - port - type: object - timeoutSeconds: - description: 'Number of seconds after which the probe - times out. Defaults to 1 second. Minimum value is - 1. More info: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probes' - format: int32 - type: integer - type: object - stdin: - description: Whether this container should allocate a - buffer for stdin in the container runtime. If this is - not set, reads from stdin in the container will always - result in EOF. Default is false. - type: boolean - stdinOnce: - description: Whether the container runtime should close - the stdin channel after it has been opened by a single - attach. When stdin is true the stdin stream will remain - open across multiple attach sessions. If stdinOnce is - set to true, stdin is opened on container start, is - empty until the first client attaches to stdin, and - then remains open and accepts data until the client - disconnects, at which time stdin is closed and remains - closed until the container is restarted. If this flag - is false, a container processes that reads from stdin - will never receive an EOF. Default is false - type: boolean - terminationMessagePath: - description: 'Optional: Path at which the file to which - the container''s termination message will be written - is mounted into the container''s filesystem. Message - written is intended to be brief final status, such as - an assertion failure message. Will be truncated by the - node if greater than 4096 bytes. The total message length - across all containers will be limited to 12kb. Defaults - to /dev/termination-log. Cannot be updated.' - type: string - terminationMessagePolicy: - description: Indicate how the termination message should - be populated. File will use the contents of terminationMessagePath - to populate the container status message on both success - and failure. FallbackToLogsOnError will use the last - chunk of container log output if the termination message - file is empty and the container exited with an error. - The log output is limited to 2048 bytes or 80 lines, - whichever is smaller. Defaults to File. Cannot be updated. - type: string - tty: - description: Whether this container should allocate a - TTY for itself, also requires 'stdin' to be true. Default - is false. - type: boolean - volumeDevices: - description: volumeDevices is the list of block devices - to be used by the container. - items: - description: volumeDevice describes a mapping of a raw - block device within a container. - properties: - devicePath: - description: devicePath is the path inside of the - container that the device will be mapped to. - type: string - name: - description: name must match the name of a persistentVolumeClaim - in the pod - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - description: Pod volumes to mount into the container's - filesystem. Cannot be updated. - items: - description: VolumeMount describes a mounting of a Volume - within a container. - properties: - mountPath: - description: Path within the container at which - the volume should be mounted. Must not contain - ':'. - type: string - mountPropagation: - description: mountPropagation determines how mounts - are propagated from the host to container and - the other way around. When not set, MountPropagationNone - is used. This field is beta in 1.10. - type: string - name: - description: This must match the Name of a Volume. - type: string - readOnly: - description: Mounted read-only if true, read-write - otherwise (false or unspecified). Defaults to - false. - type: boolean - subPath: - description: Path within the volume from which the - container's volume should be mounted. Defaults - to "" (volume's root). - type: string - subPathExpr: - description: Expanded path within the volume from - which the container's volume should be mounted. - Behaves similarly to SubPath but environment variable - references $(VAR_NAME) are expanded using the - container's environment. Defaults to "" (volume's - root). SubPathExpr and SubPath are mutually exclusive. - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - description: Container's working directory. If not specified, - the container runtime's default will be used, which - might be configured in the container image. Cannot be - updated. - type: string - required: - - name - type: object - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - modelUri: - type: string - serviceAccountName: - type: string - type: - type: string - type: object - graph: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - children: - items: - properties: - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload - logging. v2alpha1 feature that is - added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to - log - type: string - url: - description: URL to send request - logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for - backwards compatibility while v1 is the - storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging - CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. - v2alpha1 feature that is added to v1 for backwards - compatibility while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 - feature that is added to v1 for backwards compatibility - while v1 is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - type: object - type: array - serviceAccountName: - type: string - type: - type: string - type: object - type: array - endpoint: - properties: - service_host: - type: string - service_port: - format: int32 - type: integer - type: - type: string - type: object - envSecretRefName: - type: string - implementation: - type: string - logger: - description: Request/response payload logging. v2alpha1 feature - that is added to v1 for backwards compatibility while v1 - is the storage version. - properties: - mode: - description: What payloads to log - type: string - url: - description: URL to send request logging CloudEvents - type: string - type: object - methods: - items: - type: string - type: array - modelUri: - type: string - name: - type: string - parameters: - items: - properties: - name: - type: string - type: - type: string - value: - type: string - required: - - name - - type - - value - type: object - type: array - serviceAccountName: - type: string - type: - type: string - required: - - name - type: object - labels: - additionalProperties: - type: string - type: object - name: - type: string - replicas: - format: int32 - type: integer - shadow: - type: boolean - ssl: - properties: - certSecretName: - type: string - type: object - svcOrchSpec: - properties: - env: - items: - description: EnvVar represents an environment variable present - in a Container. - properties: - name: - description: Name of the environment variable. Must - be a C_IDENTIFIER. - type: string - value: - description: 'Variable references $(VAR_NAME) are expanded - using the previous defined environment variables in - the container and any service environment variables. - If a variable cannot be resolved, the reference in - the input string will be unchanged. The $(VAR_NAME) - syntax can be escaped with a double $$, ie: $$(VAR_NAME). - Escaped references will never be expanded, regardless - of whether the variable exists or not. Defaults to - "".' - type: string - valueFrom: - description: Source for the environment variable's value. - Cannot be used if value is not empty. - properties: - configMapKeyRef: - description: Selects a key of a ConfigMap. - properties: - key: - description: The key to select. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the ConfigMap or - its key must be defined - type: boolean - required: - - key - type: object - fieldRef: - description: 'Selects a field of the pod: supports - metadata.name, metadata.namespace, metadata.labels, - metadata.annotations, spec.nodeName, spec.serviceAccountName, - status.hostIP, status.podIP, status.podIPs.' - properties: - apiVersion: - description: Version of the schema the FieldPath - is written in terms of, defaults to "v1". - type: string - fieldPath: - description: Path of the field to select in - the specified API version. - type: string - required: - - fieldPath - type: object - resourceFieldRef: - description: 'Selects a resource of the container: - only resources limits and requests (limits.cpu, - limits.memory, limits.ephemeral-storage, requests.cpu, - requests.memory and requests.ephemeral-storage) - are currently supported.' - properties: - containerName: - description: 'Container name: required for volumes, - optional for env vars' - type: string - divisor: - anyOf: - - type: integer - - type: string - description: Specifies the output format of - the exposed resources, defaults to "1" - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - resource: - description: 'Required: resource to select' - type: string - required: - - resource - type: object - secretKeyRef: - description: Selects a key of a secret in the pod's - namespace - properties: - key: - description: The key of the secret to select - from. Must be a valid secret key. - type: string - name: - description: 'Name of the referent. More info: - https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names - TODO: Add other useful fields. apiVersion, - kind, uid?' - type: string - optional: - description: Specify whether the Secret or its - key must be defined - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - replicas: - format: int32 - type: integer - resources: - description: ResourceRequirements describes the compute resource - requirements. - properties: - limits: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Limits describes the maximum amount of compute - resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - requests: - additionalProperties: - anyOf: - - type: integer - - type: string - pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$ - x-kubernetes-int-or-string: true - description: 'Requests describes the minimum amount of - compute resources required. If Requests is omitted for - a container, it defaults to Limits if that is explicitly - specified, otherwise to an implementation-defined value. - More info: https://kubernetes.io/docs/concepts/configuration/manage-compute-resources-container/' - type: object - type: object - type: object - traffic: - format: int32 - type: integer - required: - - graph - - name - type: object - type: array - protocol: - type: string - replicas: - format: int32 - type: integer - serverType: - type: string - transport: - type: string - required: - - predictors - type: object - status: - description: SeldonDeploymentStatus defines the observed state of SeldonDeployment - properties: - address: - description: 'Addressable placeholder until duckv1 issue is fixed: https://github.com/kubernetes-sigs/controller-tools/issues/391' - properties: - url: - type: string - type: object - deploymentStatus: - additionalProperties: - properties: - availableReplicas: - format: int32 - type: integer - description: - type: string - explainerFor: - type: string - name: - type: string - replicas: - format: int32 - type: integer - status: - type: string - type: object - type: object - description: - type: string - replicas: - format: int32 - type: integer - serviceStatus: - additionalProperties: - properties: - explainerFor: - type: string - grpcEndpoint: - type: string - httpEndpoint: - type: string - svcName: - type: string - type: object - type: object - state: - type: string - type: object - type: object - version: v1 - versions: - - name: v1 - served: true - storage: true - - name: v1alpha2 - served: true - storage: false - - name: v1alpha3 - served: true - storage: false diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml deleted file mode 100644 index 37fb0159ea..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/app.k8s.io_v1beta1_application_seldon-core-operator.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-core-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: apps/v1 - kind: StatefulSet - - group: v1 - kind: Service - - group: apps/v1 - kind: Deployment - - group: v1 - kind: Secret - - group: v1 - kind: ConfigMap - descriptor: - description: Seldon allows users to create ML Inference Graphs to deploy their - models and serve predictions - keywords: - - seldon - - inference - links: - - description: Docs - url: https://docs.seldon.io/projects/seldon-core/en/v1.1.0/ - maintainers: - - email: dev@seldon.io - name: Seldon - owners: - - email: dev@seldon.io - name: Seldon - type: seldon-core-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.2.1 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: 1.2.1 diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml deleted file mode 100644 index ab8872b565..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/apps_v1_deployment_seldon-controller-manager.yaml +++ /dev/null @@ -1,186 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - control-plane: seldon-controller-manager - name: seldon-controller-manager - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - control-plane: seldon-controller-manager - template: - metadata: - annotations: - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - control-plane: seldon-controller-manager - spec: - containers: - - args: - - --enable-leader-election - - --webhook-port=443 - - --create-resources=$(MANAGER_CREATE_RESOURCES) - - "" - command: - - /manager - env: - - name: WATCH_NAMESPACE - value: "" - - name: RELATED_IMAGE_EXECUTOR - value: "" - - name: RELATED_IMAGE_ENGINE - value: "" - - name: RELATED_IMAGE_STORAGE_INITIALIZER - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_REST - value: "" - - name: RELATED_IMAGE_SKLEARNSERVER_GRPC - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_REST - value: "" - - name: RELATED_IMAGE_XGBOOSTSERVER_GRPC - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_REST - value: "" - - name: RELATED_IMAGE_MLFLOWSERVER_GRPC - value: "" - - name: RELATED_IMAGE_TFPROXY_REST - value: "" - - name: RELATED_IMAGE_TFPROXY_GRPC - value: "" - - name: RELATED_IMAGE_TENSORFLOW - value: "" - - name: RELATED_IMAGE_EXPLAINER - value: "" - - name: RELATED_IMAGE_MOCK_CLASSIFIER - value: "" - - name: MANAGER_CREATE_RESOURCES - value: "false" - - name: POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: CONTROLLER_ID - value: "" - - name: AMBASSADOR_ENABLED - value: "true" - - name: AMBASSADOR_SINGLE_NAMESPACE - value: "false" - - name: ENGINE_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/engine:1.4.0 - - name: ENGINE_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: ENGINE_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: ENGINE_CONTAINER_USER - value: "8888" - - name: ENGINE_LOG_MESSAGES_EXTERNALLY - value: "false" - - name: PREDICTIVE_UNIT_SERVICE_PORT - value: "9000" - - name: PREDICTIVE_UNIT_DEFAULT_ENV_SECRET_REF_NAME - value: "" - - name: PREDICTIVE_UNIT_METRICS_PORT_NAME - value: metrics - - name: ENGINE_SERVER_GRPC_PORT - value: "5001" - - name: ENGINE_SERVER_PORT - value: "8000" - - name: ENGINE_PROMETHEUS_PATH - value: /prometheus - - name: ISTIO_ENABLED - value: "true" - - name: KEDA_ENABLED - value: "false" - - name: ISTIO_GATEWAY - value: kubeflow/kubeflow-gateway - - name: ISTIO_TLS_MODE - value: "" - - name: USE_EXECUTOR - value: "true" - - name: EXECUTOR_CONTAINER_IMAGE_AND_VERSION - value: docker.io/seldonio/seldon-core-executor:1.4.0 - - name: EXECUTOR_CONTAINER_IMAGE_PULL_POLICY - value: IfNotPresent - - name: EXECUTOR_PROMETHEUS_PATH - value: /prometheus - - name: EXECUTOR_SERVER_PORT - value: "8000" - - name: EXECUTOR_CONTAINER_USER - value: "8888" - - name: EXECUTOR_CONTAINER_SERVICE_ACCOUNT_NAME - value: default - - name: EXECUTOR_SERVER_METRICS_PORT_NAME - value: metrics - - name: EXECUTOR_REQUEST_LOGGER_DEFAULT_ENDPOINT - value: http://default-broker - - name: DEFAULT_USER_ID - value: "8888" - - name: EXECUTOR_DEFAULT_CPU_REQUEST - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: EXECUTOR_DEFAULT_CPU_LIMIT - value: 500m - - name: EXECUTOR_DEFAULT_MEMORY_LIMIT - value: 512Mi - - name: ENGINE_DEFAULT_CPU_REQUEST - value: 500m - - name: ENGINE_DEFAULT_MEMORY_REQUEST - value: 512Mi - - name: ENGINE_DEFAULT_CPU_LIMIT - value: 500m - - name: ENGINE_DEFAULT_MEMORY_LIMIT - value: 512Mi - image: docker.io/seldonio/seldon-core-operator:1.4.0 - imagePullPolicy: IfNotPresent - name: manager - ports: - - containerPort: 443 - name: webhook-server - protocol: TCP - - containerPort: 8080 - name: metrics - protocol: TCP - resources: - limits: - cpu: 500m - memory: 300Mi - requests: - cpu: 100m - memory: 200Mi - volumeMounts: - - mountPath: /tmp/k8s-webhook-server/serving-certs - name: cert - readOnly: true - serviceAccountName: seldon-manager - terminationGracePeriodSeconds: 10 - volumes: - - name: cert - secret: - defaultMode: 420 - secretName: seldon-webhook-server-cert diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml deleted file mode 100644 index 558e8e507f..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_certificate_seldon-serving-cert.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Certificate -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-serving-cert - namespace: kubeflow -spec: - commonName: seldon-webhook-service.kubeflow.svc - dnsNames: - - seldon-webhook-service.kubeflow.svc.cluster.local - - seldon-webhook-service.kubeflow.svc - issuerRef: - kind: Issuer - name: seldon-selfsigned-issuer - secretName: seldon-webhook-server-cert diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml deleted file mode 100644 index 6060617450..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/cert-manager.io_v1alpha2_issuer_seldon-selfsigned-issuer.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: cert-manager.io/v1alpha2 -kind: Issuer -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-selfsigned-issuer - namespace: kubeflow -spec: - selfSigned: {} diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml deleted file mode 100644 index dae6edce6b..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-role-kubeflow.yaml +++ /dev/null @@ -1,229 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-manager-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - events - verbs: - - create - - patch -- apiGroups: - - "" - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - apps - resources: - - deployments/status - verbs: - - get - - patch - - update -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - autoscaling - resources: - - horizontalpodautoscalers/status - verbs: - - get - - patch - - update -- apiGroups: - - keda.sh - resources: - - scaledobjects - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/finalizers - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - keda.sh - resources: - - scaledobjects/status - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/finalizers - verbs: - - get - - patch - - update -- apiGroups: - - machinelearning.seldon.io - resources: - - seldondeployments/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - destinationrules - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - destinationrules/status - verbs: - - get - - patch - - update -- apiGroups: - - networking.istio.io - resources: - - virtualservices - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - networking.istio.io - resources: - - virtualservices/status - verbs: - - get - - patch - - update -- apiGroups: - - policy - resources: - - poddisruptionbudgets - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - policy - resources: - - poddisruptionbudgets/status - verbs: - - get - - patch - - update -- apiGroups: - - v1 - resources: - - namespaces - verbs: - - get - - list - - watch -- apiGroups: - - v1 - resources: - - services - verbs: - - create - - delete - - get - - list - - patch - - update - - watch -- apiGroups: - - v1 - resources: - - services/status - verbs: - - get - - patch - - update diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml deleted file mode 100644 index 7fba5e88e0..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_seldon-manager-sas-role-kubeflow.yaml +++ /dev/null @@ -1,38 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - creationTimestamp: null - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-manager-sas-role-kubeflow -rules: -- apiGroups: - - "" - resources: - - secrets - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch -- apiGroups: - - "" - resources: - - serviceaccounts - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml deleted file mode 100644 index aff8bf7842..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-manager-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml deleted file mode 100644 index ca44c3a768..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_seldon-manager-sas-rolebinding-kubeflow.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-manager-sas-rolebinding-kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: seldon-manager-sas-role-kubeflow -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml deleted file mode 100644 index e73decf81a..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_seldon-leader-election-role.yaml +++ /dev/null @@ -1,40 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-leader-election-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - configmaps - verbs: - - get - - list - - watch - - create - - update - - patch - - delete -- apiGroups: - - "" - resources: - - configmaps/status - verbs: - - get - - update - - patch -- apiGroups: - - "" - resources: - - events - verbs: - - create diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml deleted file mode 100644 index a35eec9a8b..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_seldon-leader-election-rolebinding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-leader-election-rolebinding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: seldon-leader-election-role -subjects: -- kind: ServiceAccount - name: seldon-manager - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml deleted file mode 100644 index 0e6bd6c74e..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_configmap_seldon-config.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -data: - credentials: '{"gcs":{"gcsCredentialFileName":"gcloud-application-credentials.json"},"s3":{"s3AccessKeyIDName":"awsAccessKeyID","s3SecretAccessKeyName":"awsSecretAccessKey"}}' - explainer: '{"image":"seldonio/alibiexplainer:1.4.0"}' - predictor_servers: '{"MLFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/mlflowserver_rest"}},"SKLEARN_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/sklearnserver_rest"}},"TENSORFLOW_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_grpc"},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/tfserving-proxy_rest"},"tensorflow":true,"tfImage":"tensorflow/serving:2.1.0"},"TRITON_SERVER":{"grpc":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"},"rest":{"defaultImageVersion":"20.08-py3","image":"nvcr.io/nvidia/tritonserver"}},"XGBOOST_SERVER":{"grpc":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_grpc"},"protocols":{"kfserving":{"defaultImageVersion":"0.1.0","image":"seldonio/mlserver"}},"rest":{"defaultImageVersion":"1.4.0","image":"seldonio/xgboostserver_rest"}}}' - storageInitializer: '{"cpuLimit":"1","cpuRequest":"100m","image":"gcr.io/kfserving/storage-initializer:v0.4.0","memoryLimit":"1Gi","memoryRequest":"100Mi"}' -kind: ConfigMap -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - control-plane: seldon-controller-manager - name: seldon-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml deleted file mode 100644 index 55674c5674..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_service_seldon-webhook-service.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - control-plane: seldon-controller-manager diff --git a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml b/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml deleted file mode 100644 index 1b50eaaf95..0000000000 --- a/tests/tests/legacy_kustomizations/seldon-core-operator/test_data/expected/~g_v1_serviceaccount_seldon-manager.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: seldon - app.kubernetes.io/component: seldon - app.kubernetes.io/instance: seldon-1.15 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: seldon-core-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: "1.15" - name: seldon-manager - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spark-operator/kustomize_test.go b/tests/tests/legacy_kustomizations/spark-operator/kustomize_test.go deleted file mode 100644 index a8523bb0e1..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spark_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/spark-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index 8e0607449b..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_scheduledsparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2554 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: scheduledsparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: ScheduledSparkApplication - listKind: ScheduledSparkApplicationList - plural: scheduledsparkapplications - shortNames: - - scheduledsparkapp - singular: scheduledsparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - concurrencyPolicy: - type: string - failedRunHistoryLimit: - format: int32 - type: integer - schedule: - type: string - successfulRunHistoryLimit: - format: int32 - type: integer - suspend: - type: boolean - template: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - schedule - - template - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml deleted file mode 100644 index d40ef77bf5..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_sparkapplications.sparkoperator.k8s.io.yaml +++ /dev/null @@ -1,2536 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: sparkapplications.sparkoperator.k8s.io -spec: - group: sparkoperator.k8s.io - names: - kind: SparkApplication - listKind: SparkApplicationList - plural: sparkapplications - shortNames: - - sparkapp - singular: sparkapplication - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - arguments: - items: - type: string - type: array - batchScheduler: - type: string - batchSchedulerOptions: - properties: - priorityClassName: - type: string - queue: - type: string - type: object - deps: - properties: - downloadTimeout: - format: int32 - minimum: 1 - type: integer - files: - items: - type: string - type: array - filesDownloadDir: - type: string - jars: - items: - type: string - type: array - jarsDownloadDir: - type: string - maxSimultaneousDownloads: - format: int32 - minimum: 1 - type: integer - pyFiles: - items: - type: string - type: array - type: object - driver: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - podName: - pattern: '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*' - type: string - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - serviceAccount: - type: string - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - executor: - properties: - affinity: - properties: - nodeAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - preference: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - weight: - format: int32 - type: integer - required: - - preference - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - properties: - nodeSelectorTerms: - items: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchFields: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - type: object - type: array - required: - - nodeSelectorTerms - type: object - type: object - podAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - podAntiAffinity: - properties: - preferredDuringSchedulingIgnoredDuringExecution: - items: - properties: - podAffinityTerm: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - weight: - format: int32 - type: integer - required: - - podAffinityTerm - - weight - type: object - type: array - requiredDuringSchedulingIgnoredDuringExecution: - items: - properties: - labelSelector: - properties: - matchExpressions: - items: - properties: - key: - type: string - operator: - type: string - values: - items: - type: string - type: array - required: - - key - - operator - type: object - type: array - matchLabels: - additionalProperties: - type: string - type: object - type: object - namespaces: - items: - type: string - type: array - topologyKey: - type: string - required: - - topologyKey - type: object - type: array - type: object - type: object - annotations: - additionalProperties: - type: string - type: object - configMaps: - items: - properties: - name: - type: string - path: - type: string - required: - - name - - path - type: object - type: array - coreLimit: - type: string - coreRequest: - type: string - cores: - format: int32 - minimum: 1 - type: integer - dnsConfig: - properties: - nameservers: - items: - type: string - type: array - options: - items: - properties: - name: - type: string - value: - type: string - type: object - type: array - searches: - items: - type: string - type: array - type: object - envSecretKeyRefs: - additionalProperties: - properties: - key: - type: string - name: - type: string - required: - - key - - name - type: object - type: object - envVars: - additionalProperties: - type: string - type: object - gpu: - properties: - name: - type: string - quantity: - format: int64 - type: integer - required: - - name - - quantity - type: object - hostNetwork: - type: boolean - image: - type: string - instances: - format: int32 - minimum: 1 - type: integer - javaOptions: - type: string - labels: - additionalProperties: - type: string - type: object - memory: - type: string - memoryOverhead: - type: string - nodeSelector: - additionalProperties: - type: string - type: object - schedulerName: - type: string - secrets: - items: - properties: - name: - type: string - path: - type: string - secretType: - type: string - required: - - name - - path - - secretType - type: object - type: array - securityContext: - properties: - fsGroup: - format: int64 - type: integer - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - supplementalGroups: - items: - format: int64 - type: integer - type: array - sysctls: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - type: object - sidecars: - items: - properties: - args: - items: - type: string - type: array - command: - items: - type: string - type: array - env: - items: - properties: - name: - type: string - value: - type: string - valueFrom: - properties: - configMapKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - secretKeyRef: - properties: - key: - type: string - name: - type: string - optional: - type: boolean - required: - - key - type: object - type: object - required: - - name - type: object - type: array - envFrom: - items: - properties: - configMapRef: - properties: - name: - type: string - optional: - type: boolean - type: object - prefix: - type: string - secretRef: - properties: - name: - type: string - optional: - type: boolean - type: object - type: object - type: array - image: - type: string - imagePullPolicy: - type: string - lifecycle: - properties: - postStart: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - preStop: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - type: object - type: object - livenessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - name: - type: string - ports: - items: - properties: - containerPort: - format: int32 - type: integer - hostIP: - type: string - hostPort: - format: int32 - type: integer - name: - type: string - protocol: - type: string - required: - - containerPort - type: object - type: array - readinessProbe: - properties: - exec: - properties: - command: - items: - type: string - type: array - type: object - failureThreshold: - format: int32 - type: integer - httpGet: - properties: - host: - type: string - httpHeaders: - items: - properties: - name: - type: string - value: - type: string - required: - - name - - value - type: object - type: array - path: - type: string - port: - anyOf: - - type: string - - type: integer - scheme: - type: string - required: - - port - type: object - initialDelaySeconds: - format: int32 - type: integer - periodSeconds: - format: int32 - type: integer - successThreshold: - format: int32 - type: integer - tcpSocket: - properties: - host: - type: string - port: - anyOf: - - type: string - - type: integer - required: - - port - type: object - timeoutSeconds: - format: int32 - type: integer - type: object - resources: - properties: - limits: - additionalProperties: - type: string - type: object - requests: - additionalProperties: - type: string - type: object - type: object - securityContext: - properties: - allowPrivilegeEscalation: - type: boolean - capabilities: - properties: - add: - items: - type: string - type: array - drop: - items: - type: string - type: array - type: object - privileged: - type: boolean - procMount: - type: string - readOnlyRootFilesystem: - type: boolean - runAsGroup: - format: int64 - type: integer - runAsNonRoot: - type: boolean - runAsUser: - format: int64 - type: integer - seLinuxOptions: - properties: - level: - type: string - role: - type: string - type: - type: string - user: - type: string - type: object - type: object - stdin: - type: boolean - stdinOnce: - type: boolean - terminationMessagePath: - type: string - terminationMessagePolicy: - type: string - tty: - type: boolean - volumeDevices: - items: - properties: - devicePath: - type: string - name: - type: string - required: - - devicePath - - name - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - workingDir: - type: string - required: - - name - type: object - type: array - tolerations: - items: - properties: - effect: - type: string - key: - type: string - operator: - type: string - tolerationSeconds: - format: int64 - type: integer - value: - type: string - type: object - type: array - volumeMounts: - items: - properties: - mountPath: - type: string - mountPropagation: - type: string - name: - type: string - readOnly: - type: boolean - subPath: - type: string - required: - - mountPath - - name - type: object - type: array - type: object - failureRetries: - format: int32 - type: integer - hadoopConf: - additionalProperties: - type: string - type: object - hadoopConfigMap: - type: string - image: - type: string - imagePullPolicy: - type: string - imagePullSecrets: - items: - type: string - type: array - initContainerImage: - type: string - mainApplicationFile: - type: string - mainClass: - type: string - memoryOverheadFactor: - type: string - mode: - enum: - - cluster - - client - type: string - monitoring: - properties: - exposeDriverMetrics: - type: boolean - exposeExecutorMetrics: - type: boolean - metricsProperties: - type: string - prometheus: - properties: - configFile: - type: string - configuration: - type: string - jmxExporterJar: - type: string - port: - format: int32 - maximum: 49151 - minimum: 1024 - type: integer - required: - - jmxExporterJar - type: object - required: - - exposeDriverMetrics - - exposeExecutorMetrics - type: object - nodeSelector: - additionalProperties: - type: string - type: object - pythonVersion: - enum: - - "2" - - "3" - type: string - restartPolicy: - properties: - onFailureRetries: - format: int32 - minimum: 0 - type: integer - onFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - onSubmissionFailureRetries: - format: int32 - minimum: 0 - type: integer - onSubmissionFailureRetryInterval: - format: int64 - minimum: 1 - type: integer - type: - enum: - - Never - - Always - - OnFailure - type: string - type: object - retryInterval: - format: int64 - type: integer - sparkConf: - additionalProperties: - type: string - type: object - sparkConfigMap: - type: string - sparkVersion: - type: string - timeToLiveSeconds: - format: int64 - type: integer - type: - enum: - - Java - - Python - - Scala - - R - type: string - volumes: - items: - properties: - awsElasticBlockStore: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - azureDisk: - properties: - cachingMode: - type: string - diskName: - type: string - diskURI: - type: string - fsType: - type: string - kind: - type: string - readOnly: - type: boolean - required: - - diskName - - diskURI - type: object - azureFile: - properties: - readOnly: - type: boolean - secretName: - type: string - shareName: - type: string - required: - - secretName - - shareName - type: object - cephfs: - properties: - monitors: - items: - type: string - type: array - path: - type: string - readOnly: - type: boolean - secretFile: - type: string - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - monitors - type: object - cinder: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeID: - type: string - required: - - volumeID - type: object - configMap: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - emptyDir: - properties: - medium: - type: string - sizeLimit: - type: string - type: object - fc: - properties: - fsType: - type: string - lun: - format: int32 - type: integer - readOnly: - type: boolean - targetWWNs: - items: - type: string - type: array - wwids: - items: - type: string - type: array - type: object - flexVolume: - properties: - driver: - type: string - fsType: - type: string - options: - additionalProperties: - type: string - type: object - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - required: - - driver - type: object - flocker: - properties: - datasetName: - type: string - datasetUUID: - type: string - type: object - gcePersistentDisk: - properties: - fsType: - type: string - partition: - format: int32 - type: integer - pdName: - type: string - readOnly: - type: boolean - required: - - pdName - type: object - gitRepo: - properties: - directory: - type: string - repository: - type: string - revision: - type: string - required: - - repository - type: object - glusterfs: - properties: - endpoints: - type: string - path: - type: string - readOnly: - type: boolean - required: - - endpoints - - path - type: object - hostPath: - properties: - path: - type: string - type: - type: string - required: - - path - type: object - iscsi: - properties: - chapAuthDiscovery: - type: boolean - chapAuthSession: - type: boolean - fsType: - type: string - initiatorName: - type: string - iqn: - type: string - iscsiInterface: - type: string - lun: - format: int32 - type: integer - portals: - items: - type: string - type: array - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - targetPortal: - type: string - required: - - iqn - - lun - - targetPortal - type: object - name: - type: string - nfs: - properties: - path: - type: string - readOnly: - type: boolean - server: - type: string - required: - - path - - server - type: object - persistentVolumeClaim: - properties: - claimName: - type: string - readOnly: - type: boolean - required: - - claimName - type: object - photonPersistentDisk: - properties: - fsType: - type: string - pdID: - type: string - required: - - pdID - type: object - portworxVolume: - properties: - fsType: - type: string - readOnly: - type: boolean - volumeID: - type: string - required: - - volumeID - type: object - projected: - properties: - defaultMode: - format: int32 - type: integer - sources: - items: - properties: - configMap: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - downwardAPI: - properties: - items: - items: - properties: - fieldRef: - properties: - apiVersion: - type: string - fieldPath: - type: string - required: - - fieldPath - type: object - mode: - format: int32 - type: integer - path: - type: string - resourceFieldRef: - properties: - containerName: - type: string - divisor: - type: string - resource: - type: string - required: - - resource - type: object - required: - - path - type: object - type: array - type: object - secret: - properties: - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - name: - type: string - optional: - type: boolean - type: object - serviceAccountToken: - properties: - audience: - type: string - expirationSeconds: - format: int64 - type: integer - path: - type: string - required: - - path - type: object - type: object - type: array - required: - - sources - type: object - quobyte: - properties: - group: - type: string - readOnly: - type: boolean - registry: - type: string - user: - type: string - volume: - type: string - required: - - registry - - volume - type: object - rbd: - properties: - fsType: - type: string - image: - type: string - keyring: - type: string - monitors: - items: - type: string - type: array - pool: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - user: - type: string - required: - - image - - monitors - type: object - scaleIO: - properties: - fsType: - type: string - gateway: - type: string - protectionDomain: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - sslEnabled: - type: boolean - storageMode: - type: string - storagePool: - type: string - system: - type: string - volumeName: - type: string - required: - - gateway - - secretRef - - system - type: object - secret: - properties: - defaultMode: - format: int32 - type: integer - items: - items: - properties: - key: - type: string - mode: - format: int32 - type: integer - path: - type: string - required: - - key - - path - type: object - type: array - optional: - type: boolean - secretName: - type: string - type: object - storageos: - properties: - fsType: - type: string - readOnly: - type: boolean - secretRef: - properties: - name: - type: string - type: object - volumeName: - type: string - volumeNamespace: - type: string - type: object - vsphereVolume: - properties: - fsType: - type: string - storagePolicyID: - type: string - storagePolicyName: - type: string - volumePath: - type: string - required: - - volumePath - type: object - required: - - name - type: object - type: array - required: - - driver - - executor - - mainApplicationFile - - sparkVersion - - type - type: object - required: - - metadata - - spec - type: object - version: v1beta2 - versions: - - name: v1beta2 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml deleted file mode 100644 index cc88d87a81..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/app.k8s.io_v1beta1_application_spark-operator.yaml +++ /dev/null @@ -1,46 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: spark-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ConfigMap - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: SparkOperator - descriptor: - description: Spark-operator allows users to create and manage the "SparkApplication" - custom resource. - keywords: - - spark - maintainers: - - email: holden@pigscanfly.ca - name: Holden Karau - owners: - - email: holden@pigscanfly.ca - name: Holden Karau - type: spark-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: sppark-operator - app.kubernetes.io/instance: spark-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml deleted file mode 100644 index 35aafb7332..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/apps_v1_deployment_spark-operatorsparkoperator.yaml +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatorsparkoperator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - strategy: - type: Recreate - template: - metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "10254" - prometheus.io/scrape: "true" - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - spec: - containers: - - args: - - -v=2 - - -namespace= - - -ingress-url-format= - - -controller-threads=10 - - -resync-interval=30 - - -logtostderr - - -enable-metrics=true - - -metrics-labels=app_type - - -metrics-port=10254 - - -metrics-endpoint=/metrics - - -metrics-prefix= - image: gcr.io/spark-operator/spark-operator:v1beta2-1.1.0-2.4.5 - imagePullPolicy: IfNotPresent - name: sparkoperator - ports: - - containerPort: 10254 - serviceAccountName: spark-operatoroperator-sa diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml deleted file mode 100644 index 7f059f6865..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_spark-operatoroperator-cr.yaml +++ /dev/null @@ -1,80 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatoroperator-cr -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - '*' -- apiGroups: - - "" - resources: - - services - - configmaps - - secrets - verbs: - - create - - get - - delete - - update -- apiGroups: - - extensions - - networking.k8s.io - resources: - - ingresses - verbs: - - create - - get - - delete -- apiGroups: - - "" - resources: - - nodes - verbs: - - get -- apiGroups: - - "" - resources: - - events - verbs: - - create - - update - - patch -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - create - - get - - update - - delete -- apiGroups: - - admissionregistration.k8s.io - resources: - - mutatingwebhookconfigurations - verbs: - - create - - get - - update - - delete -- apiGroups: - - sparkoperator.k8s.io - resources: - - sparkapplications - - scheduledsparkapplications - - sparkapplications/status - - scheduledsparkapplications/status - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml deleted file mode 100644 index 9a12d086df..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_spark-operatorsparkoperator-crb.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatorsparkoperator-crb -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spark-operatoroperator-cr -subjects: -- kind: ServiceAccount - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml deleted file mode 100644 index 54315725d2..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_role_spark-operatorspark-role.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: Role -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatorspark-role - namespace: kubeflow -rules: -- apiGroups: - - "" - resources: - - pods - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml deleted file mode 100644 index 33a7d945b7..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/rbac.authorization.k8s.io_v1_rolebinding_spark-operatorspark-role-binding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatorspark-role-binding - namespace: kubeflow -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: Role - name: spark-operatorspark-role -subjects: -- kind: ServiceAccount - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml deleted file mode 100644 index 31dde5014a..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatoroperator-sa.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatoroperator-sa - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml b/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml deleted file mode 100644 index 301954b41c..0000000000 --- a/tests/tests/legacy_kustomizations/spark-operator/test_data/expected/~g_v1_serviceaccount_spark-operatorspark.yaml +++ /dev/null @@ -1,13 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app.kubernetes.io/component: spark-operator - app.kubernetes.io/instance: spark-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: sparkoperator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spark-operator - name: spark-operatorspark - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spartakus/kustomize_test.go b/tests/tests/legacy_kustomizations/spartakus/kustomize_test.go deleted file mode 100644 index 69faf02fe6..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package spartakus - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/spartakus", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml deleted file mode 100644 index 7c35df68b5..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/app.k8s.io_v1beta1_application_spartakus.yaml +++ /dev/null @@ -1,41 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: spartakus - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - descriptor: - description: "" - keywords: - - spartakus - - kubeflow - links: - - description: About - url: "" - maintainers: [] - owners: [] - type: spartakus - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml deleted file mode 100644 index 4d19596076..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/apps_v1_deployment_spartakus-volunteer.yaml +++ /dev/null @@ -1,53 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - name: spartakus-volunteer - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: spartakus-volunteer - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - spec: - containers: - - args: - - volunteer - - --cluster-id=$(USAGE_ID) - - --database=https://stats-collector.kubeflow.org - env: - - name: USAGE_ID - valueFrom: - configMapKeyRef: - key: usageId - name: spartakus-config - image: gcr.io/google_containers/spartakus-amd64:v1.1.0 - name: volunteer - serviceAccountName: spartakus diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml deleted file mode 100644 index d0f0164028..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_spartakus.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - name: spartakus -rules: -- apiGroups: - - "" - resources: - - nodes - verbs: - - get - - list diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml deleted file mode 100644 index d7f3d19105..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_spartakus.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - name: spartakus -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: spartakus -subjects: -- kind: ServiceAccount - name: spartakus - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml deleted file mode 100644 index fb934b77e7..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_configmap_spartakus-config.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: v1 -data: - usageId: "6123692046963347097" -kind: ConfigMap -metadata: - annotations: {} - labels: - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - name: spartakus-config - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml b/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml deleted file mode 100644 index e5ba04d1bf..0000000000 --- a/tests/tests/legacy_kustomizations/spartakus/test_data/expected/~g_v1_serviceaccount_spartakus.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: spartakus - app.kubernetes.io/component: spartakus - app.kubernetes.io/instance: spartakus-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: spartakus - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: spartakus - name: spartakus - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/tf-job-crds/kustomize_test.go b/tests/tests/legacy_kustomizations/tf-job-crds/kustomize_test.go deleted file mode 100644 index 9cd5c23cea..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-crds/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package tf_job_crds - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/tf-job-crds", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml deleted file mode 100644 index 04ecac607a..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_tfjobs.kubeflow.org.yaml +++ /dev/null @@ -1,54 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: tfjobs.kubeflow.org -spec: - additionalPrinterColumns: - - JSONPath: .status.conditions[-1:].type - name: State - type: string - - JSONPath: .metadata.creationTimestamp - name: Age - type: date - group: kubeflow.org - names: - kind: TFJob - plural: tfjobs - singular: tfjob - scope: Namespaced - subresources: - status: {} - validation: - openAPIV3Schema: - properties: - spec: - properties: - tfReplicaSpecs: - properties: - Chief: - properties: - replicas: - maximum: 1 - minimum: 1 - type: integer - PS: - properties: - replicas: - minimum: 1 - type: integer - Worker: - properties: - replicas: - minimum: 1 - type: integer - versions: - - name: v1 - served: true - storage: true diff --git a/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml b/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml deleted file mode 100644 index 67114aee60..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-crds/test_data/expected/app.k8s.io_v1beta1_application_tf-job-crds.yaml +++ /dev/null @@ -1,50 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: tf-job-crds - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-job-crds contains the "TFJob" custom resource definition. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-crds - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-crds-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-crds - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/kustomize_test.go b/tests/tests/legacy_kustomizations/tf-job-operator/kustomize_test.go deleted file mode 100644 index 4c9ad00351..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package tf_job_operator - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/tf-job-operator", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml deleted file mode 100644 index b58d689a09..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/app.k8s.io_v1beta1_application_tf-job-operator.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: tf-job-operator - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: Service - - group: apps - kind: Deployment - - group: core - kind: ServiceAccount - - group: kubeflow.org - kind: TFJob - descriptor: - description: Tf-operator allows users to create and manage the "TFJob" custom - resource. - keywords: - - tfjob - - tf-operator - - tf-training - links: - - description: About - url: https://github.com/kubeflow/tf-operator - - description: Docs - url: https://www.kubeflow.org/docs/reference/tfjob/v1/tensorflow/ - maintainers: - - email: ricliu@google.com - name: Richard Liu - owners: - - email: ricliu@google.com - name: Richard Liu - type: tf-job-operator - version: v1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v0.7.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v0.7.0 diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/apps_v1_deployment_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/apps_v1_deployment_tf-job-operator.yaml deleted file mode 100644 index b992af790a..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/apps_v1_deployment_tf-job-operator.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator - spec: - containers: - - args: - - --alsologtostderr - - -v=1 - - --monitoring-port=8443 - env: - - name: MY_POD_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: MY_POD_NAME - valueFrom: - fieldRef: - fieldPath: metadata.name - image: gcr.io/kubeflow-images-public/tf_operator:vmaster-gda226016 - name: tf-job-operator - serviceAccountName: tf-job-operator diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml deleted file mode 100644 index dda6df0675..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-admin.yaml +++ /dev/null @@ -1,18 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: kubeflow-tfjobs-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml deleted file mode 100644 index 24bea33cac..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-edit.yaml +++ /dev/null @@ -1,29 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-tfjobs-admin: "true" - name: kubeflow-tfjobs-edit -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch - - create - - delete - - deletecollection - - patch - - update diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml deleted file mode 100644 index aa74503649..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_kubeflow-tfjobs-view.yaml +++ /dev/null @@ -1,23 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: kubeflow-tfjobs-view -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml deleted file mode 100644 index 00f6195ab1..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrole_tf-job-operator.yaml +++ /dev/null @@ -1,44 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRole -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator -rules: -- apiGroups: - - kubeflow.org - resources: - - tfjobs - - tfjobs/status - - tfjobs/finalizers - verbs: - - '*' -- apiGroups: - - apiextensions.k8s.io - resources: - - customresourcedefinitions - verbs: - - '*' -- apiGroups: - - "" - resources: - - pods - - services - - endpoints - - events - verbs: - - '*' -- apiGroups: - - apps - - extensions - resources: - - deployments - verbs: - - '*' diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml deleted file mode 100644 index e2073aef6c..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/rbac.authorization.k8s.io_v1beta1_clusterrolebinding_tf-job-operator.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1beta1 -kind: ClusterRoleBinding -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: tf-job-operator -subjects: -- kind: ServiceAccount - name: tf-job-operator - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_service_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_service_tf-job-operator.yaml deleted file mode 100644 index 99fc8e0581..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_service_tf-job-operator.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - annotations: - prometheus.io/path: /metrics - prometheus.io/port: "8443" - prometheus.io/scrape: "true" - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow -spec: - ports: - - name: monitoring-port - port: 8443 - targetPort: 8443 - selector: - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator - type: ClusterIP diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml deleted file mode 100644 index 3fba7f71da..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-dashboard.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-dashboard - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-dashboard - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml b/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml deleted file mode 100644 index 26f85a581b..0000000000 --- a/tests/tests/legacy_kustomizations/tf-job-operator/test_data/expected/~g_v1_serviceaccount_tf-job-operator.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: tf-job-operator - app.kubernetes.io/component: tfjob - app.kubernetes.io/instance: tf-job-operator-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: tf-job-operator - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: tf-job-operator - name: tf-job-operator - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/webhook/kustomize_test.go b/tests/tests/legacy_kustomizations/webhook/kustomize_test.go deleted file mode 100644 index 485d3a1a39..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/kustomize_test.go +++ /dev/null @@ -1,15 +0,0 @@ -package webhook - -import ( - "github.com/kubeflow/manifests/tests" - "testing" -) - -func TestKustomize(t *testing.T) { - testCase := &tests.KustomizeTestCase{ - Package: "../../../../tests/legacy_kustomizations/webhook", - Expected: "test_data/expected", - } - - tests.RunTestCase(t, testCase) -} diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml deleted file mode 100644 index c35a197a03..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/admissionregistration.k8s.io_v1beta1_mutatingwebhookconfiguration_admission-webhook-mutating-webhook-configuration.yaml +++ /dev/null @@ -1,33 +0,0 @@ -apiVersion: admissionregistration.k8s.io/v1beta1 -kind: MutatingWebhookConfiguration -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-mutating-webhook-configuration -webhooks: -- clientConfig: - caBundle: "" - service: - name: admission-webhook-service - namespace: kubeflow - path: /apply-poddefault - name: admission-webhook-deployment.kubeflow.org - namespaceSelector: - matchLabels: - app.kubernetes.io/part-of: kubeflow-profile - rules: - - apiGroups: - - "" - apiVersions: - - v1 - operations: - - CREATE - resources: - - pods diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml deleted file mode 100644 index 857675c943..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/apiextensions.k8s.io_v1beta1_customresourcedefinition_poddefaults.kubeflow.org.yaml +++ /dev/null @@ -1,60 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1beta1 -kind: CustomResourceDefinition -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: poddefaults.kubeflow.org -spec: - group: kubeflow.org - names: - kind: PodDefault - plural: poddefaults - singular: poddefault - scope: Namespaced - validation: - openAPIV3Schema: - properties: - apiVersion: - type: string - kind: - type: string - metadata: - type: object - spec: - properties: - desc: - type: string - env: - items: - type: object - type: array - envFrom: - items: - type: object - type: array - selector: - type: object - serviceAccountName: - type: string - volumeMounts: - items: - type: object - type: array - volumes: - items: - type: object - type: array - required: - - selector - type: object - status: - type: object - type: object - version: v1alpha1 diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml deleted file mode 100644 index 6c24199a7b..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/app.k8s.io_v1beta1_application_webhook.yaml +++ /dev/null @@ -1,45 +0,0 @@ -apiVersion: app.k8s.io/v1beta1 -kind: Application -metadata: - labels: - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - name: webhook - namespace: kubeflow -spec: - addOwnerRef: true - componentKinds: - - group: core - kind: ConfigMap - - group: apps - kind: Deployment - - group: rbac.authorization.k8s.io - kind: Role - - group: rbac.authorization.k8s.io - kind: RoleBinding - - group: core - kind: Service - - group: core - kind: ServiceAccount - - group: apps - kind: StatefulSet - descriptor: - description: injects volume, volume mounts, env vars into PodDefault - keywords: - - admission-webhook - - kubeflow - links: - - description: About - url: https://github.com/kubeflow/kubeflow/tree/master/components/admission-webhook - maintainers: [] - owners: [] - type: bootstrap - version: v1beta1 - selector: - matchLabels: - app.kubernetes.io/component: webhook - app.kubernetes.io/name: webhook diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml deleted file mode 100644 index 82e6acb589..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/apps_v1_deployment_admission-webhook-deployment.yaml +++ /dev/null @@ -1,51 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-deployment - namespace: kubeflow -spec: - selector: - matchLabels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - template: - metadata: - annotations: - sidecar.istio.io/inject: "false" - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - spec: - containers: - - image: gcr.io/kubeflow-images-public/admission-webhook:vmaster-ge5452b6f - name: admission-webhook - volumeMounts: - - mountPath: /etc/webhook/certs - name: webhook-cert - readOnly: true - serviceAccountName: admission-webhook-service-account - volumes: - - name: webhook-cert - secret: - secretName: webhook-certs diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml deleted file mode 100644 index 999d0517eb..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-cluster-role.yaml +++ /dev/null @@ -1,26 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-cluster-role -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - watch - - list - - update - - create - - patch - - delete diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml deleted file mode 100644 index ad784bf813..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-admin.yaml +++ /dev/null @@ -1,19 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-admin: "true" - name: admission-webhook-kubeflow-poddefaults-admin -rules: [] diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml deleted file mode 100644 index d4b6433f20..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-edit.yaml +++ /dev/null @@ -1,19 +0,0 @@ -aggregationRule: - clusterRoleSelectors: - - matchLabels: - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-edit: "true" - name: admission-webhook-kubeflow-poddefaults-edit -rules: [] diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml deleted file mode 100644 index 86658ecc75..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrole_admission-webhook-kubeflow-poddefaults-view.yaml +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-admin: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-poddefaults-edit: "true" - rbac.authorization.kubeflow.org/aggregate-to-kubeflow-view: "true" - name: admission-webhook-kubeflow-poddefaults-view -rules: -- apiGroups: - - kubeflow.org - resources: - - poddefaults - verbs: - - get - - list - - watch diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml deleted file mode 100644 index 132d428cc5..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/rbac.authorization.k8s.io_v1_clusterrolebinding_admission-webhook-cluster-role-binding.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-cluster-role-binding -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: admission-webhook-cluster-role -subjects: -- kind: ServiceAccount - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml deleted file mode 100644 index aa73c4bdd7..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_configmap_admission-webhook-admission-webhook-parameters.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: v1 -data: - namespace: kubeflow -kind: ConfigMap -metadata: - annotations: {} - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-admission-webhook-parameters - namespace: kubeflow diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml deleted file mode 100644 index c35c230052..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_service_admission-webhook-service.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-service - namespace: kubeflow -spec: - ports: - - port: 443 - targetPort: 443 - selector: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook diff --git a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml b/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml deleted file mode 100644 index 0b26802794..0000000000 --- a/tests/tests/legacy_kustomizations/webhook/test_data/expected/~g_v1_serviceaccount_admission-webhook-service-account.yaml +++ /dev/null @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - labels: - app: admission-webhook - app.kubernetes.io/component: webhook - app.kubernetes.io/instance: webhook-v1.0.0 - app.kubernetes.io/managed-by: kfctl - app.kubernetes.io/name: webhook - app.kubernetes.io/part-of: kubeflow - app.kubernetes.io/version: v1.0.0 - kustomize.component: admission-webhook - name: admission-webhook-service-account - namespace: kubeflow diff --git a/tests/tools/fix_common_labels.go b/tests/tools/fix_common_labels.go deleted file mode 100644 index 940cfbe5dd..0000000000 --- a/tests/tools/fix_common_labels.go +++ /dev/null @@ -1,123 +0,0 @@ -// fix_common_labels.go is a run once program to fix the commonLabels in Kubeflow -// kustomization files. Per https://github.com/kubeflow/manifests/issues/1131 commonLabels should be immutable. -// Our commonLabels violated this because we were including version. -// This is a simple program to remove those from commonLabels. -package main - -import ( - "github.com/ghodss/yaml" - "github.com/google/martian/log" - "github.com/pkg/errors" - "io/ioutil" - "os" - "path/filepath" - "sigs.k8s.io/kustomize/v3/pkg/types" -) - -const ( - VersionLabel = "app.kubernetes.io/version" - ManagedByLabel = "app.kubernetes.io/managed-by" - InstanceLabel = "app.kubernetes.io/instance" - PartOfLabel = "app.kubernetes.io/part-of" - KustomizationFile = "kustomization.yaml" -) - -// readKustomization will read a kustomization.yaml and return the kustomize object -func readKustomization(path string) (*types.Kustomization, error) { - data, err := ioutil.ReadFile(path) - if err != nil { - return nil, err - } - def := &types.Kustomization{} - if err = yaml.Unmarshal(data, def); err != nil { - return nil, err - } - return def, nil -} - -func writeKustomization(path string, k *types.Kustomization) error { - yaml, err := yaml.Marshal(k) - - if err != nil { - return errors.WithStack(errors.Wrapf(err, "Error trying to marshal kustomization for path: %v", path)) - } - - kustomizationFileErr := ioutil.WriteFile(path, yaml, 0644) - if kustomizationFileErr != nil { - return errors.WithStack(errors.Wrapf(kustomizationFileErr, "Error writing file: %v", path)) - } - return nil -} - -func main() { - rootDir := ".." - - // Directories to exclude. Thee paths should be relative to rootDir. - // Subdirectories won't be searched - excludes := map[string]bool{ - "tests": true, - ".git": true, - ".github": true, - } - - // These labels are likely to be mutable and should not be part of commonLabels - labelsToRemove := []string{VersionLabel, ManagedByLabel, InstanceLabel, PartOfLabel} - - err := filepath.Walk("..", func(path string, info os.FileInfo, err error) error { - relPath, err := filepath.Rel(rootDir, path) - - if err != nil { - log.Errorf("Could not compute relative path(%v, %v); error: %v", rootDir, path, err) - return err - } - - if _, ok := excludes[relPath]; ok { - log.Infof("Skipping directory %v", path) - return filepath.SkipDir - } - - // skip directories - if info.IsDir() { - return nil - } - - if info.Name() != KustomizationFile { - return nil - } - - k, err := readKustomization(path) - - if err != nil { - log.Errorf("Error reading file: %v; error: %v", path, err) - return nil - } - - if k.CommonLabels == nil { - return nil - } - - modified := false - - for _, l := range labelsToRemove { - if _, ok := k.CommonLabels[l]; ok { - delete(k.CommonLabels, l) - modified = true - } - } - - if !modified { - return nil - } - log.Infof("Writing updated kustomization: %v", path) - - if err := writeKustomization(path, k); err != nil { - log.Errorf("Error writing %v; error: %v", path, err) - } - return nil - }) - - if err != nil { - log.Errorf("error walking the path %v; error: %v", rootDir, err) - - } -} diff --git a/tests/validate_resources_test.go b/tests/validate_resources_test.go deleted file mode 100644 index 30fda3731c..0000000000 --- a/tests/validate_resources_test.go +++ /dev/null @@ -1,555 +0,0 @@ -package tests - -import ( - "bytes" - "io/ioutil" - "os" - "path/filepath" - "strings" - "testing" - - "github.com/ghodss/yaml" - "sigs.k8s.io/kustomize/kyaml/kio" - kyaml "sigs.k8s.io/kustomize/kyaml/yaml" - "sigs.k8s.io/kustomize/v3/pkg/types" -) - -const ( - VersionLabel = "app.kubernetes.io/version" - InstanceLabel = "app.kubernetes.io/instance" - ManagedByLabel = "app.kubernetes.io/managed-by" - PartOfLabel = "app.kubernetes.io/part-of" - KustomizationFile = "kustomization.yaml" -) - -// readKustomization will read a kustomization.yaml and return the kustomize object -func readKustomization(kfDefFile string) (*types.Kustomization, error) { - data, err := ioutil.ReadFile(kfDefFile) - if err != nil { - return nil, err - } - def := &types.Kustomization{} - if err = yaml.Unmarshal(data, def); err != nil { - return nil, err - } - return def, nil -} - -// TestCommonLabelsImmutable is a test to try to ensure we don't have mutable labels which will -// cause problems on upgrades per https://github.com/kubeflow/manifests/issues/1131. -func TestCommonLabelsImmutable(t *testing.T) { - rootDir := ".." - - // Directories to exclude. Thee paths should be relative to rootDir. - // Subdirectories won't be searched - excludes := map[string]bool{ - "tests": true, - ".git": true, - ".github": true, - } - - // These labels are likely to be mutable and should not be part of commonLabels - // TODO(jlewi): In 1.0 and prior versions the convention was to use mutable values that contained the - // version number. That was the original reason we made these forbidden labels; it was to stop people - // from attaching mutable versions that would break upgrades. Post 1.1 we might want to start relaxing that - // and allow applications to start using these labels but in an immutable fashion. - forbiddenLabels := []string{VersionLabel, ManagedByLabel, InstanceLabel, PartOfLabel} - - err := filepath.Walk("..", func(path string, info os.FileInfo, err error) error { - relPath, err := filepath.Rel(rootDir, path) - - if err != nil { - t.Fatalf("Could not compute relative path(%v, %v); error: %v", rootDir, path, err) - } - - if _, ok := excludes[relPath]; ok { - t.Logf("Skipping directory %v", path) - return filepath.SkipDir - } - - // skip directories - if info.IsDir() { - return nil - } - - if info.Name() != KustomizationFile { - return nil - } - - k, err := readKustomization(path) - - if err != nil { - t.Errorf("Error reading file: %v; error: %v", path, err) - return nil - } - - if k.CommonLabels == nil { - return nil - } - - for _, l := range forbiddenLabels { - if _, ok := k.CommonLabels[l]; ok { - t.Errorf("%v has forbidden commonLabel %v", path, l) - } - } - return nil - }) - - if err != nil { - t.Errorf("error walking the path %v; error: %v", rootDir, err) - } -} - -// deprecatedK8s represents a K8s resource that should be replaced by a new type. -type deprecatedK8s struct { - oldVersion string - oldKind string - newVersion string - newKind string -} - -func versionAndKind(version string, kind string) string { - return version + "/" + kind -} - -// TestValidK8sResources reads all the K8s resources and performs a bunch of validation checks. -// -// Currently the following checks are performed: -// i) ensure we don't include status in resources -// as this causes validation issues: https://github.com/kubeflow/manifests/issues/1174 -// -// ii) ensure that if annotations are present it is not empty. -// Having empty annotations https://github.com/GoogleContainerTools/kpt/issues/541 causes problems for kpt and -// ACM. Offending YAML looks like -// metadata: -// name: kf-admin-iap -// annotations: -// rules: -// ... -func TestValidK8sResources(t *testing.T) { - rootDir := ".." - - // Directories to exclude. Thee paths should be relative to rootDir. - // Subdirectories won't be searched - excludes := map[string]bool{ - "tests": true, - ".git": true, - ".github": true, - "profiles/overlays/test": true, - // Skip cnrm-install. We don't install this with ACM so we don't need to fix it. - // It seems like if this is an issue it should eventually get fixed in upstream cnrm configs. - // The CNRM directory has lots of CRDS with non empty status. - "distributions/gcp/v2/management/cnrm-install": true, - } - - deprecated := []deprecatedK8s{ - { - oldVersion: "extensions/v1beta1", - oldKind: "Ingress", - newVersion: "networking.k8s.io/v1beta1", - newKind: "Ingress", - }, - { - oldVersion: "extensions/v1beta1", - oldKind: "Deployment", - newVersion: "apps/v1", - newKind: "Deployment", - }, - } - - deprecatedMap := map[string]string{} - - for _, d := range deprecated { - deprecatedMap[versionAndKind(d.oldVersion, d.oldKind)] = versionAndKind(d.newVersion, d.newKind) - } - - err := filepath.Walk("..", func(path string, info os.FileInfo, err error) error { - relPath, err := filepath.Rel(rootDir, path) - - if err != nil { - t.Fatalf("Could not compute relative path(%v, %v); error: %v", rootDir, path, err) - } - - if _, ok := excludes[relPath]; ok { - return filepath.SkipDir - } - - // skip directories - if info.IsDir() { - return nil - } - - // Skip non YAML files - ext := filepath.Ext(info.Name()) - - if ext != ".yaml" && ext != ".yml" { - return nil - } - data, err := ioutil.ReadFile(path) - - if err != nil { - t.Errorf("Error reading %v; error: %v", path, err) - } - - input := bytes.NewReader(data) - reader := kio.ByteReader{ - Reader: input, - // We need to disable adding reader annotations because - // we want to run some checks about whether annotations are set and - // adding those annotations interferes with that. - OmitReaderAnnotations: true, - } - - nodes, err := reader.Read() - - if err != nil { - t.Errorf("Error unmarshaling %v; error: %v", path, err) - } - - for _, n := range nodes { - //root := n - - m, err := n.GetMeta() - // Skip objects with no metadata - if err != nil { - continue - } - - // Skip Kustomization - if strings.ToLower(m.Kind) == "kustomization" { - continue - } - if m.Name == "" || m.Kind == "" { - continue - } - - // Check if its a deprecated K8s resource - vAndK := versionAndKind(m.APIVersion, m.Kind) - if v, ok := deprecatedMap[vAndK]; ok { - t.Errorf("Path %v; resource %v; has version and kind %v which should be changed to %v", path, m.Name, vAndK, v) - } - - // Ensure status isn't set - f := n.Field("status") - - if !kyaml.IsFieldEmpty(f) { - t.Errorf("Path %v; resource %v; has status field", path, m.Name) - } - - metadata := n.Field("metadata") - - checkEmptyAnnotations := func() { - annotations := metadata.Value.Field("annotations") - - if annotations == nil { - return - } - - if kyaml.IsFieldEmpty(annotations) { - t.Errorf("Path %v; resource %v; has empty annotations; if no annotations are present the field shouldn't be present", path, m.Name) - return - } - } - - checkEmptyAnnotations() - } - return nil - }) - - if err != nil { - t.Errorf("error walking the path %v; error: %v", rootDir, err) - } -} - -// TestCheckWebhookSelector is a test to try to ensure all the mutating webhooks -// have either namespaceSeletor or objectSelector to avoid issues per -// https://github.com/kubeflow/manifests/issues/1213. -func TestCheckWebhookSelector(t *testing.T) { - rootDir := ".." - - // Directories to exclude. Thee paths should be relative to rootDir. - // Subdirectories won't be searched - excludes := map[string]bool{ - "tests": true, - ".git": true, - ".github": true, - } - - err := filepath.Walk("..", func(path string, info os.FileInfo, err error) error { - relPath, err := filepath.Rel(rootDir, path) - - if err != nil { - t.Fatalf("Could not compute relative path(%v, %v); error: %v", rootDir, path, err) - } - - if _, ok := excludes[relPath]; ok { - return filepath.SkipDir - } - - // skip directories - if info.IsDir() { - return nil - } - - // Skip non YAML files - ext := filepath.Ext(info.Name()) - - if ext != ".yaml" && ext != ".yml" { - return nil - } - data, err := ioutil.ReadFile(path) - - if err != nil { - t.Errorf("Error reading %v; error: %v", path, err) - } - - input := bytes.NewReader(data) - reader := kio.ByteReader{ - Reader: input, - } - - nodes, err := reader.Read() - - if err != nil { - if strings.Contains(err.Error(), "wrong Node Kind for") { - t.Logf("Skipping non SequenceNode yaml %v", path) - return nil - } - t.Errorf("Error unmarshaling %v; error: %v", path, err) - } - - for _, n := range nodes { - //root := n - - m, err := n.GetMeta() - // Skip objects with no metadata - if err != nil { - continue - } - - // Skip objects with no name or kind - if m.Name == "" || m.Kind == "" { - continue - } - - // Skip non-mutating webhook files - if strings.ToLower(m.Kind) != "mutatingwebhookconfiguration" { - continue - } - - // Ensure objectSelector or namespaceSelector is set for pod resource - if webhooks := n.Field("webhooks"); webhooks != nil { - webhookElements, err := webhooks.Value.Elements() - // Skip webhooks with no element - if err != nil { - continue - } - for _, w := range webhookElements { - if kyaml.IsFieldEmpty(w.Field("namespaceSelector")) && kyaml.IsFieldEmpty(w.Field("objectSelector")) { - // If there's no objectSelector or namespaceSelector, make sure the mutating webhook doesn't - // have any rule for pods. - if rules := w.Field("rules"); rules != nil { - ruleElements, err := rules.Value.Elements() - if err != nil { - continue - } - for _, rule := range ruleElements { - if resources := rule.Field("resources"); resources != nil { - resourceElements, err := resources.Value.Elements() - if err != nil { - continue - } - for _, resource := range resourceElements { - resourceString, err := resource.String() - if err != nil { - continue - } - if strings.TrimSpace(resourceString) == "pods" || strings.TrimSpace(resourceString) == "*" { - t.Errorf("Path %v; resource %v; does not have objectSelector or namespaceSelector is for mutating webhook on pods", path, m.Name) - } - } - } - } - } - } - } - } - } - return nil - }) - - if err != nil { - t.Errorf("error walking the path %v; error: %v", rootDir, err) - } -} - -// kustomizationHasDeprecatedEnv checks if the node has the depracted format of configmap generator -// see https://github.com/kubeflow/manifests/issues/538 -func kustomizationHasDeprecatedEnv(t *testing.T, n *kyaml.RNode) bool { - configMaps, err := n.Pipe(kyaml.Lookup("configMapGenerator")) - if err != nil { - s, _ := n.String() - t.Errorf("%v: %s", err, s) - return false - } - - if configMaps == nil { - // doesn't have any configmap generators, skip the Resource - return false - } - - // visit each container and apply the cpu and memory reservations - - hasDeprecated := false - err = configMaps.VisitElements(func(cm *kyaml.RNode) error { - // Ensure env field isn't set - f := cm.Field("env") - - if !kyaml.IsFieldEmpty(f) { - hasDeprecated = true - } - return nil - }) - - if err != nil { - t.Errorf("Error chcecking if deprecated envs are set; error %v", err) - } - - return hasDeprecated -} - -// TestKustomizationHasDeprecatedEnv verifies that kustomizationHasDeprecatedEnv correctly -// detects obosolete kustomizations -func TestKustomizationHasDeprecatedEnv(t *testing.T) { - type testCase struct { - Raw string - Expected bool - } - - testCases := []testCase{ - { - Raw: `apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- cluster-role-binding.yaml -configMapGenerator: -- name: config-map - env: somenev - -`, - Expected: true, - }, - { - Raw: `apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: -- cluster-role-binding.yaml -configMapGenerator: -- name: config-map - envs: - - params.env -`, - Expected: false, - }, - } - - for _, c := range testCases { - n, err := kyaml.Parse(c.Raw) - - if err != nil { - t.Errorf("Could not parse yaml:\n%v\nerror: %v", c.Raw, err) - continue - } - - actual := kustomizationHasDeprecatedEnv(t, n) - - if actual != c.Expected { - t.Errorf("got %v; want %v; YAML\n:%v", actual, c.Expected, c.Raw) - } - } -} - -// TestNoObsoleteKustomizations verifies that all kustomization files aren't using -// deprecated/obsolete features -func TestNoObsoleteKustomizations(t *testing.T) { - rootDir := ".." - - // Directories to exclude. Thee paths should be relative to rootDir. - // Subdirectories won't be searched - excludes := map[string]bool{ - "tests": true, - ".git": true, - ".github": true, - "profiles/overlays/test": true, - // Skip cnrm-install. We don't install this with ACM so we don't need to fix it. - // It seems like if this is an issue it should eventually get fixed in upstream cnrm configs. - // The CNRM directory has lots of CRDS with non empty status. - "distributions/gcp/v2/management/cnrm-install": true, - } - - err := filepath.Walk("..", func(path string, info os.FileInfo, err error) error { - relPath, err := filepath.Rel(rootDir, path) - - if err != nil { - t.Fatalf("Could not compute relative path(%v, %v); error: %v", rootDir, path, err) - } - - if _, ok := excludes[relPath]; ok { - return filepath.SkipDir - } - - // skip directories - if info.IsDir() { - return nil - } - - if strings.ToLower(info.Name()) != "kustomization.yaml" { - return nil - } - - data, err := ioutil.ReadFile(path) - - if err != nil { - t.Errorf("Error reading %v; error: %v", path, err) - } - - input := bytes.NewReader(data) - reader := kio.ByteReader{ - Reader: input, - // We need to disable adding reader annotations because - // we want to run some checks about whether annotations are set and - // adding those annotations interferes with that. - OmitReaderAnnotations: true, - } - - nodes, err := reader.Read() - - if err != nil { - t.Errorf("Error unmarshaling %v; error: %v", path, err) - } - - for _, n := range nodes { - m, err := n.GetMeta() - // Skip objects with no metadata - if err != nil { - continue - } - - // Skip Kustomization - if strings.ToLower(m.Kind) != "kustomization" { - continue - } - - hasDeprecated := kustomizationHasDeprecatedEnv(t, n) - - if hasDeprecated { - t.Errorf("Kustomization %v is using obsolete syntax for configMapGenerate; you must use envs not env", path) - } - } - return nil - }) - - if err != nil { - t.Errorf("error walking the path %v; error: %v", rootDir, err) - } -} From 50777323877232e85f9f04b31ea406915eee893c Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Mon, 7 Feb 2022 23:47:47 +0200 Subject: [PATCH 02/10] gitignore: Don't track pyc files Signed-off-by: Kimonas Sotirchos --- .gitignore | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.gitignore b/.gitignore index 159bdd32ca..df407d535d 100644 --- a/.gitignore +++ b/.gitignore @@ -2,6 +2,8 @@ .vscode .DS_Store +**/*.pyc + # Swap [._]*.s[a-v][a-z] !*.svg # comment out if you don't need vector files From 7f36e1f016107bf8b4390091337115df284c5351 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Mon, 7 Feb 2022 23:48:25 +0200 Subject: [PATCH 03/10] flake8: Introduce linting file Signed-off-by: Kimonas Sotirchos --- .flake8 | 4 ++++ tests/OWNERS | 9 --------- tests/README.md | 25 +++++++++++++++++++++++++ 3 files changed, 29 insertions(+), 9 deletions(-) create mode 100644 .flake8 delete mode 100644 tests/OWNERS create mode 100644 tests/README.md diff --git a/.flake8 b/.flake8 new file mode 100644 index 0000000000..5fbf5c9bd6 --- /dev/null +++ b/.flake8 @@ -0,0 +1,4 @@ +[flake8] +docstring_convention = google +exclude = assets,__init__.py,__pycache__ +ignore = D100,D103,D104,D107,W503 diff --git a/tests/OWNERS b/tests/OWNERS deleted file mode 100644 index 1b3ed8cb59..0000000000 --- a/tests/OWNERS +++ /dev/null @@ -1,9 +0,0 @@ -approvers: - - andreyvelich - - gaocegege - - jeffwan - - johnugeorge - - krishnadurai - - PatrickXYS - - kimwnasptd - - thesuperzapper diff --git a/tests/README.md b/tests/README.md new file mode 100644 index 0000000000..ad8c8f801a --- /dev/null +++ b/tests/README.md @@ -0,0 +1,25 @@ +# Kustomize Manifest Tests + +## E2E + +There are 2 goals for the e2e tests: +1. Verify that core components can be applied and become Ready +2. Virify that core CRDs can be created and succeed + +### Components + +The e2e are installing everything by using the [single-install +command](../README.md#install-with-a-single-command). This means that all of +the core and common (Istio, Knativ, Cert Manager) are being installed and +included in the tests. + +### Test Suite + +The e2e tests are completely independent of the underlying K8s cluster, as well +as the platform of the cluster. These tests should be able to run in real +world clusters, as well as ephemeral ones like KinD. + +The tests are also explicitly bypassing any authentication system of the +installation. The goal of these tests are to ensure that a common use case that +deploys all of Kubeflow's components can succeed. Thus we only want to test +that the core CRDs can be successfully applied and complete. From 704243df3c96ad91f54c0469b30c4648dbe1deba Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Mon, 7 Feb 2022 23:48:46 +0200 Subject: [PATCH 04/10] hack: Introduce scripts for cluster manipulation Signed-off-by: Kimonas Sotirchos --- hack/kind-cluster-1-20.yaml | 25 ++++++++++++++++ hack/kind-cluster-1-21.yaml | 25 ++++++++++++++++ hack/setup-kubeflow.sh | 58 +++++++++++++++++++++++++++++++++++++ 3 files changed, 108 insertions(+) create mode 100644 hack/kind-cluster-1-20.yaml create mode 100644 hack/kind-cluster-1-21.yaml create mode 100755 hack/setup-kubeflow.sh diff --git a/hack/kind-cluster-1-20.yaml b/hack/kind-cluster-1-20.yaml new file mode 100644 index 0000000000..ef9ea061c2 --- /dev/null +++ b/hack/kind-cluster-1-20.yaml @@ -0,0 +1,25 @@ +# https://github.com/kubernetes-sigs/kind/issues/1954#issuecomment-737775492 +# https://github.com/istio/istio/blob/e02690fbfb8bda564582b27d22d9e8e6e00422a5/prow/config/trustworthy-jwt.yaml#L1-L13 +# This configs KinD to spin up a k8s cluster with trustworthy jwt (Service Account Token Volume Projection) feature. +kind: Cluster +apiVersion: kind.x-k8s.io/v1alpha4 +name: manifests-1-20 +nodes: +- role: control-plane + image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca +- role: worker + image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca +- role: worker + image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca +- role: worker + image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca +kubeadmConfigPatches: + - | + apiVersion: kubeadm.k8s.io/v1beta2 + kind: ClusterConfiguration + metadata: + name: config + apiServer: + extraArgs: + "service-account-issuer": "kubernetes.default.svc" + "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" diff --git a/hack/kind-cluster-1-21.yaml b/hack/kind-cluster-1-21.yaml new file mode 100644 index 0000000000..ab55fa3da3 --- /dev/null +++ b/hack/kind-cluster-1-21.yaml @@ -0,0 +1,25 @@ +# https://github.com/kubernetes-sigs/kind/issues/1954#issuecomment-737775492 +# https://github.com/istio/istio/blob/e02690fbfb8bda564582b27d22d9e8e6e00422a5/prow/config/trustworthy-jwt.yaml#L1-L13 +# This configs KinD to spin up a k8s cluster with trustworthy jwt (Service Account Token Volume Projection) feature. +kind: Cluster +apiVersion: kind.x-k8s.io/v1alpha4 +name: manifests-1-21 +nodes: +- role: control-plane + image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c +- role: worker + image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c +- role: worker + image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c +- role: worker + image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c +kubeadmConfigPatches: + - | + apiVersion: kubeadm.k8s.io/v1beta2 + kind: ClusterConfiguration + metadata: + name: config + apiServer: + extraArgs: + "service-account-issuer": "kubernetes.default.svc" + "service-account-signing-key-file": "/etc/kubernetes/pki/sa.key" diff --git a/hack/setup-kubeflow.sh b/hack/setup-kubeflow.sh new file mode 100755 index 0000000000..2978b9d804 --- /dev/null +++ b/hack/setup-kubeflow.sh @@ -0,0 +1,58 @@ +#!/usr/bin/env bash + +# Copyright 2021 The Kubeflow Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# This shell script is used to setup Katib deployment. +set -euo pipefail + +TIMEOUT=600s # 10mins + +echo "Creating Kubeflow namespace..." +kubectl create namespace kubeflow + +echo "Deploying all Kubeflow components..." +function install_kubeflow { + kustomize build example --load_restrictor none | kubectl apply -f - --validate=false +} + +while ! install_kubeflow; +do + echo "Retrying to apply resources" + sleep 10 +done + +echo "---" +echo "Waiting for all Kubeflow components to become ready." + +echo "Waiting for Cert Manager pods to become ready..." +kubectl wait --timeout=${TIMEOUT} -n cert-manager --all --for=condition=Ready pod + +echo "Waiting for istio-system Pods to become ready..." +kubectl wait --timeout=${TIMEOUT} -n istio-system --all --for=condition=Ready pod + +echo "Waiting for knative-serving Pods to become ready..." +kubectl wait --timeout=${TIMEOUT} -n knative-serving --all --for=condition=Ready pod + +echo "Waiting for kubeflow/ml-pipelines to become ready..." +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l app=ml-pipeline --for=condition=Ready pod + +echo "Waiting for kubeflow/kfserving to become ready..." +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l app=kfserving --for=condition=Ready pod + +echo "Waiting for kubeflow/katib to become ready..." +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l katib.kubeflow.org/component=controller --for=condition=Ready pod + +echo "Waiting for kubeflow/training-operator to become ready..." +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l control-plane=kubeflow-training-operator --for=condition=Ready pod From 2f9da01af076178f4bdab2738eca705ec57587f0 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Mon, 7 Feb 2022 23:51:41 +0200 Subject: [PATCH 05/10] tests: Add e2e test Signed-off-by: Kimonas Sotirchos --- tests/e2e/.gitignore | 1 + tests/e2e/README.md | 27 ++++ tests/e2e/hack/cleanup_proxies.sh | 10 ++ tests/e2e/hack/cleanup_yamls.sh | 16 ++ tests/e2e/hack/proxy_istio.sh | 18 +++ tests/e2e/hack/proxy_pipelines.sh | 10 ++ tests/e2e/mnist.py | 83 +++++++++++ tests/e2e/requirements.txt | 3 + tests/e2e/runner.sh | 17 +++ tests/e2e/settings.py | 9 ++ tests/e2e/utils/__init__.py | 0 tests/e2e/utils/isvc.py | 20 +++ tests/e2e/utils/katib.py | 199 +++++++++++++++++++++++++ tests/e2e/utils/kfserving.py | 29 ++++ tests/e2e/utils/tfjob.py | 127 ++++++++++++++++ tests/e2e/utils/watch.py | 76 ++++++++++ tests/e2e/yamls/role.yaml | 78 ++++++++++ tests/e2e/yamls/sa-role-binding.yaml | 13 ++ tests/e2e/yamls/service-account.yaml | 5 + tests/e2e/yamls/user-role-binding.yaml | 13 ++ 20 files changed, 754 insertions(+) create mode 100644 tests/e2e/.gitignore create mode 100644 tests/e2e/README.md create mode 100755 tests/e2e/hack/cleanup_proxies.sh create mode 100755 tests/e2e/hack/cleanup_yamls.sh create mode 100755 tests/e2e/hack/proxy_istio.sh create mode 100755 tests/e2e/hack/proxy_pipelines.sh create mode 100644 tests/e2e/mnist.py create mode 100644 tests/e2e/requirements.txt create mode 100755 tests/e2e/runner.sh create mode 100644 tests/e2e/settings.py create mode 100644 tests/e2e/utils/__init__.py create mode 100644 tests/e2e/utils/isvc.py create mode 100644 tests/e2e/utils/katib.py create mode 100644 tests/e2e/utils/kfserving.py create mode 100644 tests/e2e/utils/tfjob.py create mode 100644 tests/e2e/utils/watch.py create mode 100644 tests/e2e/yamls/role.yaml create mode 100644 tests/e2e/yamls/sa-role-binding.yaml create mode 100644 tests/e2e/yamls/service-account.yaml create mode 100644 tests/e2e/yamls/user-role-binding.yaml diff --git a/tests/e2e/.gitignore b/tests/e2e/.gitignore new file mode 100644 index 0000000000..77b431abfc --- /dev/null +++ b/tests/e2e/.gitignore @@ -0,0 +1 @@ +**/pids.env diff --git a/tests/e2e/README.md b/tests/e2e/README.md new file mode 100644 index 0000000000..e1688de073 --- /dev/null +++ b/tests/e2e/README.md @@ -0,0 +1,27 @@ +# E2E Mnist + +We've converted the community's [E2E Notebook](https://github.com/kubeflow/pipelines/blob/master/samples/contrib/kubeflow-e2e-mnist/kubeflow-e2e-mnist.ipynb) into a python script. This test can be used to ensure the core Kubeflow CRDs can be applied and complete. + +This test is using the following Kubeflow CRDs: +1. Kubeflow Pipelines +2. Katib Experiments +3. TFJobs +4. KFServing InferenceServices + +## How to run + +The heart of this test is the `mnist.py` python script, which applies and waits +for the CRDs to complete. The python scripts are all expecting that +1. `kubectl` is configured with access to a Kubeflow cluster +2. `kustomize` 3.2.0 is available +3. The KFP backend is proxied to localhost + +While the `mnist.py` is used for running the test, it is advised to use the +`runner.sh` script instead. The `runner.sh` script will be running the python +script, but also ensure the KFP backend is port-forwarded and will clean up +afterwards. + +## Failures + +Both the python and the bash scripts are designed to be failing early. If any +intermediate command fails, then the whole test will fail. diff --git a/tests/e2e/hack/cleanup_proxies.sh b/tests/e2e/hack/cleanup_proxies.sh new file mode 100755 index 0000000000..139113c4eb --- /dev/null +++ b/tests/e2e/hack/cleanup_proxies.sh @@ -0,0 +1,10 @@ +#!/usr/bin/env bash +source pids.env + +echo "Killing background jobs..." + +kill -KILL $ISTIO_PID +echo "Killed istio port-forward." + +kill -KILL $PIPELINES_PID +echo "Killed pipelines port-forward." diff --git a/tests/e2e/hack/cleanup_yamls.sh b/tests/e2e/hack/cleanup_yamls.sh new file mode 100755 index 0000000000..4d304fb3ae --- /dev/null +++ b/tests/e2e/hack/cleanup_yamls.sh @@ -0,0 +1,16 @@ +#!/usr/bin/env bash +source pids.env + +echo "Killing background jobs..." + +kill -KILL $ISTIO_PID +echo "Killed istio port-forward." + +kill -KILL $PIPELINES_PID +echo "Killed pipelines port-forward." + +kubectl delete experiments.kubeflow.org -n kubeflow-user-example-com mnist-e2e + +kubectl delete tfjobs.kubeflow.org -n kubeflow-user-example-com mnist-e2e + +kubectl delete inferenceservices.serving.kubeflow.org -n kubeflow-user-example-com mnist-e2e diff --git a/tests/e2e/hack/proxy_istio.sh b/tests/e2e/hack/proxy_istio.sh new file mode 100755 index 0000000000..af13176257 --- /dev/null +++ b/tests/e2e/hack/proxy_istio.sh @@ -0,0 +1,18 @@ +#!/usr/bin/env bash +set -euo pipefail + +# stop all port-forward processes +trap ctrl_c INT + +function ctrl_c() { + echo "Stopping port-forward processes..." + echo "Killing process $ISTIO_PID..." + kill -KILL $ISTIO_PID +} + +kubectl port-forward -n istio-system svc/istio-ingressgateway 8080:80 & +ISTIO_PID=$! +echo "Started Istio port-forward, pid: $ISTIO_PID" +echo ISTIO_PID=$ISTIO_PID >> pids.env + +sleep 1 diff --git a/tests/e2e/hack/proxy_pipelines.sh b/tests/e2e/hack/proxy_pipelines.sh new file mode 100755 index 0000000000..055eb3d00b --- /dev/null +++ b/tests/e2e/hack/proxy_pipelines.sh @@ -0,0 +1,10 @@ +#!/usr/bin/env bash +set -euo pipefail + +kubectl port-forward -n kubeflow svc/ml-pipeline-ui 3000:80 & +PIPELINES_PID=$! + +echo "Started Pipelines port-forward, pid: $PIPELINES_PID" +echo PIPELINES_PID=$PIPELINES_PID >> pids.env + +sleep 1 diff --git a/tests/e2e/mnist.py b/tests/e2e/mnist.py new file mode 100644 index 0000000000..73014e4d8d --- /dev/null +++ b/tests/e2e/mnist.py @@ -0,0 +1,83 @@ +"""E2E Kubeflow test that tesst Pipelines, Katib, TFJobs and KFServing. + +Requires: +pip install kfp==1.8.4 +pip install kubeflow-katib==0.12.0 +""" +import kfp +import kfp.dsl as dsl +from kubernetes import config + +import settings +from utils import isvc, katib, kfserving, tfjob + +config.load_kube_config() + + +@dsl.pipeline( + name="End to End Pipeline", + description="An end to end mnist example including hyperparameter tuning, " + "train and inference", +) +def mnist_pipeline(name=settings.PIPELINE_NAME, + namespace=settings.NAMESPACE, + training_steps=settings.TRAINING_STEPS): + # Run the hyperparameter tuning with Katib. + katib_op = katib.create_katib_experiment_task( + name, namespace, training_steps) + + # Create volume to train and serve the model. + model_volume_op = dsl.VolumeOp( + name="model-volume", + resource_name="model-volume", + size="1Gi", + modes=dsl.VOLUME_MODE_RWO, + ) + + # Run the distributive training with TFJob. + tfjob_op = tfjob.create_tfjob_task(name, namespace, training_steps, + katib_op, model_volume_op) + + # Create the KFServing inference. + kfserving.create_kfserving_task(name, namespace, tfjob_op, + model_volume_op) + + +if __name__ == "__main__": + # Run the Kubeflow Pipeline in the user's namespace. + kfp_client = kfp.Client(host="http://localhost:3000", + namespace="kubeflow-user-example-com") + kfp_client.runs.api_client.default_headers.update( + {"kubeflow-userid": "kubeflow-user-example-com"}) + + # create the KFP run + run_id = kfp_client.create_run_from_pipeline_func( + mnist_pipeline, + namespace=settings.NAMESPACE, + arguments={}, + ).run_id + print("Run ID: ", run_id) + + katib.wait_to_create(name=settings.EXPERIMENT_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) + + tfjob.wait_to_create(name=settings.EXPERIMENT_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) + + tfjob.wait_to_succeed(name=settings.TFJOB_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) + + katib.wait_to_succeed(name=settings.EXPERIMENT_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) + + isvc.wait_to_create(settings.ISVC_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) + + isvc.wait_to_succeed(settings.ISVC_NAME, + namespace=settings.NAMESPACE, + timeout=settings.TIMEOUT) diff --git a/tests/e2e/requirements.txt b/tests/e2e/requirements.txt new file mode 100644 index 0000000000..a5bdf9934c --- /dev/null +++ b/tests/e2e/requirements.txt @@ -0,0 +1,3 @@ +kubernetes==21.7.0 +kfp==1.8.4 +kubeflow-katib==0.12.0 diff --git a/tests/e2e/runner.sh b/tests/e2e/runner.sh new file mode 100755 index 0000000000..440f3044e4 --- /dev/null +++ b/tests/e2e/runner.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash +set -euo pipefail + +echo "Installing necessary RBAC.""" +kubectl apply -f yamls + +echo "Setting up port-forward..." +./hack/proxy_istio.sh +./hack/proxy_pipelines.sh + +echo "Running the tests.""" +python3 mnist.py + +echo "Cleaning up opened processes.""" +./hack/cleanup_proxies.sh + +echo "Leaving the cluster as is for further inspection." diff --git a/tests/e2e/settings.py b/tests/e2e/settings.py new file mode 100644 index 0000000000..e303c05aeb --- /dev/null +++ b/tests/e2e/settings.py @@ -0,0 +1,9 @@ +NAMESPACE = "kubeflow-user-example-com" +TIMEOUT = 300 + +PIPELINE_NAME = "mnist-e2e" +EXPERIMENT_NAME = "mnist-e2e" +TFJOB_NAME = "mnist-e2e" +ISVC_NAME = "mnist-e2e" + +TRAINING_STEPS = "1" diff --git a/tests/e2e/utils/__init__.py b/tests/e2e/utils/__init__.py new file mode 100644 index 0000000000..e69de29bb2 diff --git a/tests/e2e/utils/isvc.py b/tests/e2e/utils/isvc.py new file mode 100644 index 0000000000..96d6bcac77 --- /dev/null +++ b/tests/e2e/utils/isvc.py @@ -0,0 +1,20 @@ +from . import watch + +GROUP = "serving.kubeflow.org" +PLURAL = "inferenceservices" +VERSION = "v1beta1" + + +# wait_for_ready(name, namespace, timeout): +def wait_to_create(name, namespace, timeout): + """Wait until the specified InferenceService gets created.""" + return watch.wait_created_cr(name, namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) + + +def wait_to_succeed(name, namespace, timeout): + """Wait until the specified InferenceService succeeds.""" + return watch.wait_to_succeed(name=name, namespace=namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) diff --git a/tests/e2e/utils/katib.py b/tests/e2e/utils/katib.py new file mode 100644 index 0000000000..4491706129 --- /dev/null +++ b/tests/e2e/utils/katib.py @@ -0,0 +1,199 @@ +"""Katib helper functions to create a Pipeline task.""" +from kfp import components +from kubeflow.katib import (ApiClient, V1beta1AlgorithmSpec, + V1beta1ExperimentSpec, V1beta1FeasibleSpace, + V1beta1ObjectiveSpec, V1beta1ParameterSpec, + V1beta1TrialParameterSpec, V1beta1TrialTemplate) + +from . import watch + +TFJOB_IMAGE = "docker.io/liuhougangxa/tf-estimator-mnist" +KATIB_LAUNCHER_URL = "https://raw.githubusercontent.com/kubeflow/pipelines/1.8.0-rc.1/components/kubeflow/katib-launcher/component.yaml" + +GROUP = "kubeflow.org" +PLURAL = "experiments" +VERSION = "v1beta1" + + +def wait_to_create(name, namespace, timeout): + """Wait until the specified Katib Experiment gets created.""" + return watch.wait_created_cr(name, namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) + + +def wait_to_succeed(name, namespace, timeout): + """Wait until the specified Katib Experiment succeeds.""" + return watch.wait_to_succeed(name=name, namespace=namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) + + +# This function converts Katib Experiment HP results to args. +def convert_katib_results(katib_results) -> str: + import json + import pprint + katib_results_json = json.loads(katib_results) + print("Katib results:") + pprint.pprint(katib_results_json) + best_hps = [] + for pa in katib_results_json["currentOptimalTrial"]["parameterAssignments"]: + if pa["name"] == "learning_rate": + best_hps.append("--tf-learning-rate=" + pa["value"]) + elif pa["name"] == "batch_size": + best_hps.append("--tf-batch-size=" + pa["value"]) + print("Best Hyperparameters: {}".format(best_hps)) + return " ".join(best_hps) + + +# You should define the Experiment name, namespace and number of training steps +# in the arguments. +def create_katib_experiment_task(experiment_name, experiment_namespace, + training_steps): + # Trial count specification. + max_trial_count = 5 + max_failed_trial_count = 3 + parallel_trial_count = 2 + + # Objective specification. + objective = V1beta1ObjectiveSpec( + type="minimize", + goal=0.001, + objective_metric_name="loss", + ) + + # Algorithm specification. + algorithm = V1beta1AlgorithmSpec( + algorithm_name="random", + ) + + # Experiment search space. + # In this example we tune learning rate and batch size. + parameters = [ + V1beta1ParameterSpec( + name="learning_rate", + parameter_type="double", + feasible_space=V1beta1FeasibleSpace( + min="0.01", + max="0.05", + ), + ), + V1beta1ParameterSpec( + name="batch_size", + parameter_type="int", + feasible_space=V1beta1FeasibleSpace( + min="80", + max="100", + ), + ), + ] + + # Experiment Trial template. + # TODO (andreyvelich): Use community image for the mnist example. + trial_spec = { + "apiVersion": "kubeflow.org/v1", + "kind": "TFJob", + "spec": { + "tfReplicaSpecs": { + "Chief": { + "replicas": 1, + "restartPolicy": "OnFailure", + "template": { + "metadata": { + "annotations": { + "sidecar.istio.io/inject": "false", + }, + }, + "spec": { + "containers": [ + { + "name": "tensorflow", + "image": TFJOB_IMAGE, + "command": [ + "python", + "/opt/model.py", + "--tf-train-steps=" + + str(training_steps), + "--tf-learning-rate=${trialParameters.learningRate}", + "--tf-batch-size=${trialParameters.batchSize}" + ] + } + ] + } + } + }, + "Worker": { + "replicas": 1, + "restartPolicy": "OnFailure", + "template": { + "metadata": { + "annotations": { + "sidecar.istio.io/inject": "false", + }, + }, + "spec": { + "containers": [ + { + "name": "tensorflow", + "image": "docker.io/liuhougangxa/tf-estimator-mnist", + "command": [ + "python", + "/opt/model.py", + "--tf-train-steps=" + + str(training_steps), + "--tf-learning-rate=${trialParameters.learningRate}", + "--tf-batch-size=${trialParameters.batchSize}" + ] + } + ] + } + } + } + } + } + } + + # Configure parameters for the Trial template. + trial_template = V1beta1TrialTemplate( + primary_container_name="tensorflow", + primary_pod_labels={"training.kubeflow.org/job-role": "master"}, + trial_parameters=[ + V1beta1TrialParameterSpec( + name="learningRate", + description="Learning rate for the training model", + reference="learning_rate", + ), + V1beta1TrialParameterSpec( + name="batchSize", + description="Batch size for the model", + reference="batch_size", + ), + ], + trial_spec=trial_spec, + ) + + # Create an Experiment from the above parameters. + experiment_spec = V1beta1ExperimentSpec( + max_trial_count=max_trial_count, + max_failed_trial_count=max_failed_trial_count, + parallel_trial_count=parallel_trial_count, + objective=objective, + algorithm=algorithm, + parameters=parameters, + trial_template=trial_template, + ) + + # Create the KFP task for the Katib Experiment. + # Experiment Spec should be serialized to a valid Kubernetes object. + katib_experiment_launcher_op = components.load_component_from_url( + KATIB_LAUNCHER_URL, + ) + + op = katib_experiment_launcher_op( + experiment_name=experiment_name, + experiment_namespace=experiment_namespace, + experiment_spec=ApiClient().sanitize_for_serialization(experiment_spec), + experiment_timeout_minutes=60, + delete_finished_experiment=False) + + return op diff --git a/tests/e2e/utils/kfserving.py b/tests/e2e/utils/kfserving.py new file mode 100644 index 0000000000..366ff945d5 --- /dev/null +++ b/tests/e2e/utils/kfserving.py @@ -0,0 +1,29 @@ +from kfp import components + + +KFSERVING_URL = "https://raw.githubusercontent.com/kubeflow/pipelines/master/components/kubeflow/kfserving/component.yaml" + + +# You should define the model name, namespace, output of the TFJob and model +# volume tasks in the arguments. +def create_kfserving_task(model_name, model_namespace, tfjob_op, + model_volume_op): + inference_service = ''' +apiVersion: "serving.kubeflow.org/v1beta1" +kind: "InferenceService" +metadata: + name: {} + namespace: {} + annotations: + "sidecar.istio.io/inject": "false" +spec: + predictor: + tensorflow: + storageUri: "pvc://{}/" +'''.format(model_name, model_namespace, str(model_volume_op.outputs["name"])) + + kfserving_launcher_op = components.load_component_from_url(KFSERVING_URL) + kfserving_launcher_op( + action="create", + inferenceservice_yaml=inference_service, + ).after(tfjob_op) diff --git a/tests/e2e/utils/tfjob.py b/tests/e2e/utils/tfjob.py new file mode 100644 index 0000000000..0f3d3528da --- /dev/null +++ b/tests/e2e/utils/tfjob.py @@ -0,0 +1,127 @@ +from kfp import components + +from . import katib, watch + +TFJOB_URL = "https://raw.githubusercontent.com/kubeflow/pipelines/master/components/kubeflow/launcher/component.yaml" + +GROUP = "kubeflow.org" +PLURAL = "tfjobs" +VERSION = "v1" + + +def wait_to_create(name, namespace, timeout): + """Wait until the specified TFJob gets created.""" + return watch.wait_created_cr(name, namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) + + +def wait_to_succeed(name, namespace, timeout): + """Wait until the specified TFJob succeeds.""" + return watch.wait_to_succeed(name=name, namespace=namespace, + timeout=timeout, group=GROUP, plural=PLURAL, + version=VERSION) + + +# You should define the TFJob name, namespace, number of training steps, output +# of Katib and model volume tasks in the arguments. +def create_tfjob_task(tfjob_name, tfjob_namespace, training_steps, katib_op, + model_volume_op): + import json + + # Get parameters from the Katib Experiment. + # Parameters are in the format + # "--tf-learning-rate=0.01 --tf-batch-size=100" + convert_katib_results_op = components.func_to_container_op( + katib.convert_katib_results, + ) + best_hp_op = convert_katib_results_op(katib_op.output) + best_hps = str(best_hp_op.output) + + # Create the TFJob Chief and Worker specification with the best + # Hyperparameters. + # TODO (andreyvelich): Use community image for the mnist example. + tfjob_chief_spec = { + "replicas": 1, + "restartPolicy": "OnFailure", + "template": { + "metadata": { + "annotations": { + "sidecar.istio.io/inject": "false", + }, + }, + "spec": { + "containers": [ + { + "name": "tensorflow", + "image": "docker.io/liuhougangxa/tf-estimator-mnist", + "command": [ + "sh", + "-c", + ], + "args": [ + "python /opt/model.py " + "--tf-export-dir=/mnt/export " + "--tf-train-steps={} {}".format(training_steps, + best_hps), + ], + "volumeMounts": [ + { + "mountPath": "/mnt/export", + "name": "model-volume", + }, + ], + }, + ], + "volumes": [ + { + "name": "model-volume", + "persistentVolumeClaim": { + "claimName": str(model_volume_op.outputs["name"]), + }, + }, + ], + }, + }, + } + + tfjob_worker_spec = { + "replicas": 1, + "restartPolicy": "OnFailure", + "template": { + "metadata": { + "annotations": { + "sidecar.istio.io/inject": "false", + }, + }, + "spec": { + "containers": [ + { + "name": "tensorflow", + "image": "docker.io/liuhougangxa/tf-estimator-mnist", + "command": [ + "sh", + "-c", + ], + "args": [ + "python /opt/model.py " + "--tf-export-dir=/mnt/export " + "--tf-train-steps={} {}".format(training_steps, + best_hps), + ], + }, + ], + }, + }, + } + + # Create the KFP task for the TFJob. + tfjob_launcher_op = components.load_component_from_url(TFJOB_URL) + op = tfjob_launcher_op( + name=tfjob_name, + namespace=tfjob_namespace, + chief_spec=json.dumps(tfjob_chief_spec), + worker_spec=json.dumps(tfjob_worker_spec), + tfjob_timeout_minutes=60, + delete_finished_tfjob=False) + return op diff --git a/tests/e2e/utils/watch.py b/tests/e2e/utils/watch.py new file mode 100644 index 0000000000..902c53aa53 --- /dev/null +++ b/tests/e2e/utils/watch.py @@ -0,0 +1,76 @@ +from kubernetes import client, watch + + +def wait_created_cr(name, namespace, group, version, plural, timeout): + """Wait until the specified CR gets created.""" + w = watch.Watch() + custom_api = client.CustomObjectsApi() + + fn = custom_api.list_namespaced_custom_object + + print("Waiting for %s %s.%s to get created..." % (name, plural, group)) + for event in w.stream(func=fn, namespace=namespace, group=group, + version=version, plural=plural, + timeout_seconds=timeout): + if event["type"] != "ADDED": + continue + + cr = event["object"] + if cr["metadata"]["name"] != name: + continue + + # the requested CR got created + print("%s %s.%s got created." % (name, plural, group)) + w.stop() + return True + + raise RuntimeError("Timeout reached waiting for CR %s %s.%s" % + (name, plural, group)) + + +def succeeded(job): + """Check if the CR has either a Ready or Succeeded condition""" + if "status" not in job: + return False + + if "conditions" not in job["status"]: + return False + + for condition in job["status"]["conditions"]: + if "Succeeded" in condition["type"]: + return condition["status"] == "True" + + if "Ready" in condition["type"]: + return condition["status"] == "True" + + return False + + +def wait_to_succeed(name, namespace, group, version, plural, timeout): + """Wait until the specified TFJob succeeds.""" + w = watch.Watch() + custom_api = client.CustomObjectsApi() + + cr = {} + fn = custom_api.list_namespaced_custom_object + + print("Waiting for %s %s.%s to succeed..." % (name, plural, group)) + for event in w.stream(func=fn, namespace=namespace, group=group, + version=version, plural=plural, + timeout_seconds=timeout): + + cr = event["object"] + if cr["metadata"]["name"] != name: + continue + + if event["type"] == "DELETED": + raise RuntimeError("%s %s.%s was deleted." % + (name, plural, group)) + + if succeeded(cr): + w.stop() + print("%s %s.%s succeeded." % (name, plural, group)) + return + + raise RuntimeError("Timeout reached waiting for %s %s.%s to succeed: %s" % + (name, plural, version, cr)) diff --git a/tests/e2e/yamls/role.yaml b/tests/e2e/yamls/role.yaml new file mode 100644 index 0000000000..ce0f5274a9 --- /dev/null +++ b/tests/e2e/yamls/role.yaml @@ -0,0 +1,78 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + annotations: + name: pipeline-runner + namespace: kubeflow-user-example-com +rules: +- apiGroups: + - "" + resources: + - persistentvolumes + - persistentvolumeclaims + verbs: + - '*' +- apiGroups: + - argoproj.io + resources: + - workflows + verbs: + - get + - list + - watch + - update + - patch +- apiGroups: + - "" + resources: + - pods + - pods/exec + - pods/log + - services + verbs: + - '*' +- apiGroups: + - "" + - apps + - extensions + resources: + - deployments + - replicasets + verbs: + - '*' +- apiGroups: + - experiments.kubeflow.org + resources: + - '*' + verbs: + - '*' +- apiGroups: + - pipelines.kubeflow.org + resources: + - '*' + verbs: + - '*' +- apiGroups: + - kubeflow.org + resources: + - '*' + verbs: + - '*' +- apiGroups: + - batch + resources: + - jobs + verbs: + - '*' +- apiGroups: + - machinelearning.seldon.io + resources: + - seldondeployments + verbs: + - '*' +- apiGroups: + - serving.kubeflow.org + resources: + - '*' + verbs: + - '*' diff --git a/tests/e2e/yamls/sa-role-binding.yaml b/tests/e2e/yamls/sa-role-binding.yaml new file mode 100644 index 0000000000..648f13efc0 --- /dev/null +++ b/tests/e2e/yamls/sa-role-binding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: sa-pipeline-runner + namespace: kubeflow-user-example-com +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: pipeline-runner +subjects: +- kind: ServiceAccount + name: pipeline-runner + namespace: kubeflow-user-example-com diff --git a/tests/e2e/yamls/service-account.yaml b/tests/e2e/yamls/service-account.yaml new file mode 100644 index 0000000000..47af572828 --- /dev/null +++ b/tests/e2e/yamls/service-account.yaml @@ -0,0 +1,5 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + name: pipeline-runner + namespace: kubeflow-user-example-com diff --git a/tests/e2e/yamls/user-role-binding.yaml b/tests/e2e/yamls/user-role-binding.yaml new file mode 100644 index 0000000000..81633fc011 --- /dev/null +++ b/tests/e2e/yamls/user-role-binding.yaml @@ -0,0 +1,13 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: user-pipeline-runner + namespace: kubeflow-user-example-com +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: pipeline-runner +subjects: +- kind: User + name: kubeflow-user-example-com + namespace: kubeflow-user-example-com From 3f1067c28f351fc6bf6747f189c549a357addb74 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Mon, 7 Feb 2022 23:52:05 +0200 Subject: [PATCH 06/10] GH action for running e2e test Signed-off-by: Kimonas Sotirchos --- .github/workflows/kind_e2e.yaml | 117 ++++++++++++++++++++++++++++++++ 1 file changed, 117 insertions(+) create mode 100644 .github/workflows/kind_e2e.yaml diff --git a/.github/workflows/kind_e2e.yaml b/.github/workflows/kind_e2e.yaml new file mode 100644 index 0000000000..8b2612f1e6 --- /dev/null +++ b/.github/workflows/kind_e2e.yaml @@ -0,0 +1,117 @@ +name: KinD + +on: + pull_request: + branches: [ 'master' ] + +defaults: + run: + shell: bash + working-directory: ./tests/e2e + +jobs: + + e2e-tests: + name: e2e tests + runs-on: ubuntu-latest + strategy: + fail-fast: false # Keep running if one leg fails. + matrix: + cluster: + - v1.20.7 + #- v1.21.1 + + test-suite: + - ./tests/e2e + + include: + # Map between K8s and KinD versions. + # This is attempting to make it a bit clearer what's being tested. + # See: https://github.com/kubernetes-sigs/kind/releases + #- cluster: v1.21.1 + #k8s-version: v1.21.1 + #kind-version: v0.11.1 + #kind-image-sha: sha256:69860bda5563ac81e3c0057d654b5253219618a22ec3a346306239bba8cfa1a6 + #cluster-suffix: c${{ github.run_id }}.local + - cluster: v1.20.7 + k8s-version: v1.20.7 + kind-version: v0.11.1 + kind-image-sha: sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca + cluster-suffix: c${{ github.run_id }}.local + + steps: + - name: Check out code onto testing dir + uses: actions/checkout@v2 + with: + path: ./tests/e2e + + - name: Install KinD + run: | + set -x + # Disable swap otherwise memory enforcement doesn't work + # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600009955324200 + sudo swapoff -a + sudo rm -f /swapfile + # Use in-memory storage to avoid etcd server timeouts. + # https://kubernetes.slack.com/archives/CEKK1KTN2/p1615134111016300 + # https://github.com/kubernetes-sigs/kind/issues/845 + sudo mkdir -p /tmp/etcd + sudo mount -t tmpfs tmpfs /tmp/etcd + curl -Lo ./kind https://github.com/kubernetes-sigs/kind/releases/download/${{ matrix.kind-version }}/kind-$(uname)-amd64 + chmod +x ./kind + sudo mv kind /usr/local/bin + - name: Configure KinD Cluster + working-directory: ./tests/e2e + run: | + set -x + # KinD configuration. + cat > kind.yaml < Date: Wed, 9 Feb 2022 19:59:54 +0200 Subject: [PATCH 07/10] Reduce the installed components and system reqs Signed-off-by: Kimonas Sotirchos --- .github/workflows/kind_e2e.yaml | 10 ++- hack/kind-cluster-1-20.yaml | 2 - hack/kind-cluster-1-21.yaml | 2 - hack/setup-kubeflow-light.sh | 105 ++++++++++++++++++++++++++++++++ 4 files changed, 112 insertions(+), 7 deletions(-) create mode 100755 hack/setup-kubeflow-light.sh diff --git a/.github/workflows/kind_e2e.yaml b/.github/workflows/kind_e2e.yaml index 8b2612f1e6..9c43700b81 100644 --- a/.github/workflows/kind_e2e.yaml +++ b/.github/workflows/kind_e2e.yaml @@ -97,8 +97,6 @@ jobs: image: kindest/node:${{ matrix.k8s-version }}@${{ matrix.kind-image-sha }} - role: worker image: kindest/node:${{ matrix.k8s-version }}@${{ matrix.kind-image-sha }} - - role: worker - image: kindest/node:${{ matrix.k8s-version }}@${{ matrix.kind-image-sha }} EOF - name: Create KinD Cluster working-directory: ./tests/e2e @@ -114,4 +112,10 @@ jobs: - name: Install Kubeflow Components working-directory: ./tests/e2e run: | - ./hack/setup-kubeflow.sh + ./hack/setup-kubeflow-light.sh + - name: Run e2e tests + working-directory: ./tests/e2e + run: | + cd tests/e2e + pip install -r requirements.txt + ./runner.sh diff --git a/hack/kind-cluster-1-20.yaml b/hack/kind-cluster-1-20.yaml index ef9ea061c2..b7e84dcedb 100644 --- a/hack/kind-cluster-1-20.yaml +++ b/hack/kind-cluster-1-20.yaml @@ -11,8 +11,6 @@ nodes: image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca - role: worker image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca -- role: worker - image: kindest/node:1.20.7@sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca kubeadmConfigPatches: - | apiVersion: kubeadm.k8s.io/v1beta2 diff --git a/hack/kind-cluster-1-21.yaml b/hack/kind-cluster-1-21.yaml index ab55fa3da3..4aa81ce7fb 100644 --- a/hack/kind-cluster-1-21.yaml +++ b/hack/kind-cluster-1-21.yaml @@ -11,8 +11,6 @@ nodes: image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c - role: worker image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c -- role: worker - image: kindest/node:1.21.2@sha256:19c2315068fd5951aa478ef7b9d1771572c8ea58fbfbf7bc81f7b153679d7a6c kubeadmConfigPatches: - | apiVersion: kubeadm.k8s.io/v1beta2 diff --git a/hack/setup-kubeflow-light.sh b/hack/setup-kubeflow-light.sh new file mode 100755 index 0000000000..fe046ad6a1 --- /dev/null +++ b/hack/setup-kubeflow-light.sh @@ -0,0 +1,105 @@ +#!/usr/bin/env bash + +# Copyright 2021 The Kubeflow Authors. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# This shell script is used to setup Katib deployment. +set -euo pipefail + +TIMEOUT=600s # 10mins + +echo "Creating Kubeflow namespace..." +kubectl create namespace kubeflow + +echo "Deploying Cert-Manager." +kustomize build common/cert-manager/cert-manager/base | kubectl apply -f - + +echo "Waiting for Cert Manager pods to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n cert-manager --all --for=condition=Ready pod + +echo "Deploying Istio." +kustomize build common/istio-1-11/istio-crds/base | kubectl apply -f - +kustomize build common/istio-1-11/istio-namespace/base | kubectl apply -f - +kustomize build common/istio-1-11/istio-install/base | kubectl apply -f - + +echo "Waiting for istio-system Pods to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n istio-system --all --for=condition=Ready pod + +echo "Deploying Knative." +function install_knative { + kustomize build common/knative/knative-serving/overlays/gateways | kubectl apply -f - +} + +while ! install_knative; +do + echo "Retrying to install knative..." + sleep 10 +done + +kustomize build common/knative/knative-eventing/base | kubectl apply -f - +kustomize build common/istio-1-11/cluster-local-gateway/base | kubectl apply -f - + +echo "Waiting for knative-serving Pods to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n knative-serving --all --for=condition=Ready pod + +echo "Deploying KFP." +function install_kfp { + kustomize build apps/pipeline/upstream/env/platform-agnostic-multi-user | kubectl apply -f - --validate=false +} + +while ! install_kfp; +do + echo "Retrying to install kfp..." + sleep 10 +done + +echo "Waiting for kubeflow/ml-pipelines to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l app=ml-pipeline --for=condition=Ready pod + +echo "Deploying KFServing." +kustomize build apps/kfserving/upstream/overlays/kubeflow | kubectl apply -f - + +echo "Waiting for kubeflow/kfserving to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l app=kfserving --for=condition=Ready pod + +echo "Deploying Katib." +kustomize build apps/katib/upstream/installs/katib-with-kubeflow | kubectl apply -f - + +echo "Waiting for kubeflow/katib to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l katib.kubeflow.org/component=controller --for=condition=Ready pod + +echo "Deploying Training Operator." +kustomize build apps/training-operator/upstream/overlays/kubeflow | kubectl apply -f - + +echo "Waiting for kubeflow/training-operator to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l control-plane=kubeflow-training-operator --for=condition=Ready pod + +echo "Installing Profiles Controller." +kustomize build apps/profiles/upstream/overlays/kubeflow | kubectl apply -f - + +echo "Waiting for kubeflow/profiles-controller to become ready..." +sleep 5 +kubectl wait --timeout=${TIMEOUT} -n kubeflow -l kustomize.component=profiles --for=condition=Ready pod + +echo "Creating user resources." +kustomize build common/user-namespace/base | kubectl apply -f - +kustomize build common/cert-manager/kubeflow-issuer/base | kubectl apply -f - + From 074ef9db31f858057268f87a7368e4a5b7027249 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Thu, 10 Feb 2022 14:00:01 +0200 Subject: [PATCH 08/10] kserve: Add simple kustomization file To avoid having to use --load_restrictor none we'll need to wrap the KServe manifests inside a kustomization.yaml file. Signed-off-by: Kimonas Sotirchos --- contrib/kserve/upstream/kustomization.yaml | 7 +++++++ example/kustomization.yaml | 3 +-- 2 files changed, 8 insertions(+), 2 deletions(-) create mode 100644 contrib/kserve/upstream/kustomization.yaml diff --git a/contrib/kserve/upstream/kustomization.yaml b/contrib/kserve/upstream/kustomization.yaml new file mode 100644 index 0000000000..c04c2da5e2 --- /dev/null +++ b/contrib/kserve/upstream/kustomization.yaml @@ -0,0 +1,7 @@ +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization +resources: +- kserve.yaml +# For KF 1.5 we are including both KFServing and KServe. Thus we install the +# standalone kserve manifests, to avoid conflicts with 0.6.1 KFServing. +#- kserve_kubeflow.yaml diff --git a/example/kustomization.yaml b/example/kustomization.yaml index b78aa3f834..6da185cc83 100644 --- a/example/kustomization.yaml +++ b/example/kustomization.yaml @@ -53,5 +53,4 @@ resources: - ../common/user-namespace/base # KServe -#- ../contrib/kserve/upstream/kserve_kubeflow.yaml -- ../contrib/kserve/upstream/kserve.yaml +- ../contrib/kserve/upstream From 830179b569b9c994fb0c5ec18ba08e6a5bae07a0 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Thu, 10 Feb 2022 14:07:26 +0200 Subject: [PATCH 09/10] unittests: Fix unit tests Signed-off-by: Kimonas Sotirchos --- .github/workflows/manifests_unittests.yaml | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/.github/workflows/manifests_unittests.yaml b/.github/workflows/manifests_unittests.yaml index d187f45405..42b0e2e331 100644 --- a/.github/workflows/manifests_unittests.yaml +++ b/.github/workflows/manifests_unittests.yaml @@ -13,9 +13,14 @@ jobs: - name: Check out repo uses: actions/checkout@v2 - - name: Unit Test + - name: Install Kustomize + working-directory: ./tests/e2e run: | - cd tests - make test + curl -Lo ./kustomize https://github.com/kubernetes-sigs/kustomize/releases/download/v3.2.0/kustomize_3.2.0_linux_amd64 + chmod +x ./kustomize + sudo mv kustomize /usr/local/bin + - name: Unit Test + run: | + kustomize build example From 8262dcd672a621568f4de4f18022e6b6b7c461e9 Mon Sep 17 00:00:00 2001 From: Kimonas Sotirchos Date: Thu, 10 Feb 2022 14:07:41 +0200 Subject: [PATCH 10/10] gh: Remove action for e2e tests We should use prow instead to trigger our e2e tests. Signed-off-by: Kimonas Sotirchos --- .github/workflows/kind_e2e.yaml | 121 -------------------------------- 1 file changed, 121 deletions(-) delete mode 100644 .github/workflows/kind_e2e.yaml diff --git a/.github/workflows/kind_e2e.yaml b/.github/workflows/kind_e2e.yaml deleted file mode 100644 index 9c43700b81..0000000000 --- a/.github/workflows/kind_e2e.yaml +++ /dev/null @@ -1,121 +0,0 @@ -name: KinD - -on: - pull_request: - branches: [ 'master' ] - -defaults: - run: - shell: bash - working-directory: ./tests/e2e - -jobs: - - e2e-tests: - name: e2e tests - runs-on: ubuntu-latest - strategy: - fail-fast: false # Keep running if one leg fails. - matrix: - cluster: - - v1.20.7 - #- v1.21.1 - - test-suite: - - ./tests/e2e - - include: - # Map between K8s and KinD versions. - # This is attempting to make it a bit clearer what's being tested. - # See: https://github.com/kubernetes-sigs/kind/releases - #- cluster: v1.21.1 - #k8s-version: v1.21.1 - #kind-version: v0.11.1 - #kind-image-sha: sha256:69860bda5563ac81e3c0057d654b5253219618a22ec3a346306239bba8cfa1a6 - #cluster-suffix: c${{ github.run_id }}.local - - cluster: v1.20.7 - k8s-version: v1.20.7 - kind-version: v0.11.1 - kind-image-sha: sha256:688fba5ce6b825be62a7c7fe1415b35da2bdfbb5a69227c499ea4cc0008661ca - cluster-suffix: c${{ github.run_id }}.local - - steps: - - name: Check out code onto testing dir - uses: actions/checkout@v2 - with: - path: ./tests/e2e - - - name: Install KinD - run: | - set -x - # Disable swap otherwise memory enforcement doesn't work - # See: https://kubernetes.slack.com/archives/CEKK1KTN2/p1600009955324200 - sudo swapoff -a - sudo rm -f /swapfile - # Use in-memory storage to avoid etcd server timeouts. - # https://kubernetes.slack.com/archives/CEKK1KTN2/p1615134111016300 - # https://github.com/kubernetes-sigs/kind/issues/845 - sudo mkdir -p /tmp/etcd - sudo mount -t tmpfs tmpfs /tmp/etcd - curl -Lo ./kind https://github.com/kubernetes-sigs/kind/releases/download/${{ matrix.kind-version }}/kind-$(uname)-amd64 - chmod +x ./kind - sudo mv kind /usr/local/bin - - name: Configure KinD Cluster - working-directory: ./tests/e2e - run: | - set -x - # KinD configuration. - cat > kind.yaml <